Browse by Supervisors

Up a level
Export as [feed] RSS 2.0 [feed] RSS 1.0 [feed] Atom
Group by: Creators | Item Type | No Grouping
Jump to: | . | A | B | G | J | K | M | N | P | R | S | T | V
Number of items: 27.

Mohapatra, Pranay (2013) Automated Academic Planning System. BTech thesis.

Gupta, Vikash Kumar (2013) Novel Schemes for Authentication. BTech thesis.

Devi, Kshetrimayum Jenita (2013) A Secure Image Steganography Using LSB Technique and Random Pseudo Random Encoding Technique. BTech thesis.

.

., Prateek (2013) Intrusion Detection Using Self-Training Support Vector Machines. BTech thesis.

A

Aneja, Anant and Patki, Akash Ramesh and Kumbhalwar, Rohit (2007) Approximate proper name matching. BTech thesis.

Agarwal, Keshav (2012) Secure Messaging Service on Google App Engine using ECC and RSA Encryption. BTech thesis.

Akram, S T (2014) Security in smartphones and tablets. BTech thesis.

B

Bhalla, Karan and Prasad, Deepak (2007) Data preperation and pattern discovery for web usage mining. BTech thesis.

G

Gahlaut, Himanshu (2009) Prevention of Malicious Transactions in Database Management Systems. BTech thesis.

J

Jain, Sachin kumar and Tandon, Ankit (2010) Balancing between data utility and privacy preservation in data mining. BTech thesis.

K

Kumar, Anil (2014) Design and Implementation of Stateful Packet Filtering Firewall and optimization using Binary Decision Diagram. BTech thesis.

K otesh, Banoth (2014) A Study on Vehicle Trajectory Analysis. BTech thesis.

M

Mitra, Arijeet (2013) Agent - Based Traffic Simulation
using Microscopic Modelling.
BTech thesis.

Mahapatra, Jyoti Ranjan and Mohanty, Jignyanshu (2009) Anomaly Detection in Ethernet Networks Using Self Organising Maps. BTech thesis.

Majhi, Jogendra (2015) Optimized Collision Warning Protocol in VANET. BTech thesis.

N

Nag, Kaustav and Birua, Mihir (2012) Implementing Symmetric Cryptographic Techniques in Online fee Payment System of NIT Rourkela. BTech thesis.

P

Pawa, Taran Deep Singh (2011) Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) protocol. BTech thesis.

Panda , Sunil Kumar and Ramteke, Rahul G (2011) Attacks on Geographic Routing Protocols for Wireless Sensor Network. BTech thesis.

R

Rana, Yashveer (2012) Evasion and Detection of Metamorphic Viruses. BTech thesis.

S

Shekhar, Shubham (2015) Localization in Wireless Sensor Networks. BTech thesis.

Singh, Vikash Kumar (2009) Machine Learning Techniques For Detecting Untrusted Pages on the Web. BTech thesis.

Saha, Siddharth and Kumar, Telugu Praveen (2010) Network intrusion detection system using string matching. BTech thesis.

Sinha, B K and Kumar, J (2010) Privacy Preserving Clustering In Data Mining. BTech thesis.

Saikia, Bikramjit and Bhowmik, Debkumar (2009) Study of Association Rule Mining and Different Hiding Techniques. BTech thesis.

T

Telugu, Praveen Kumar and Saha, Siddarth (2010) Network intrusion detection using string matching. BTech thesis.

V

Varma, Anurag (2015) Detection of Denial of Service Attack Through Network Traffic Analysis. BTech thesis.

Venkatesh, Rasula (2015) Malicious Accounts Detection Based on Short URLs in Twitter. BTech thesis.

This list was generated on Wed Nov 13 04:15:04 2024 IST.