Showing
1 - 16
results of
16
for search '
Mir, Roohie Naaz
'
Skip to content
VuFind
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced
Author
Mir, Roohie Naaz
Showing
1 - 16
results of
16
for search '
Mir, Roohie Naaz
'
, query time: 0.03s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Internet of things security vulnerabilities and recommended solutions
by
Olanrewaju, Rashidah Funke
,
Khan, Burhan ul Islam
,
Anwar, Farhat
,
Mir
,
Roohie
Naaz
Published 2018
Get full text
Get full text
Get full text
Get full text
2
ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET
by
Khan, Burhan Ul Islam
,
Olanrewaju, Rashidah Funke
,
Anwar, Farhat
,
Mir
,
Roohie
Naaz
Published 2019
Get full text
Get full text
Get full text
Get full text
3
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
by
Olanrewaju, Rashidah Funke
,
Khan, Burhan ul Islam
,
Mir
,
Roohie
Naaz
,
Shah, Asadullah
,
,
Published 2015
Get full text
Get full text
Get full text
4
RAED: Response analysis of educational data for leveraging knowledge dissemination system
by
Olanrewaju, Rashidah Funke
,
Khan, Burhan ul Islam
,
Mir
,
Roohie
Naaz
,
Baba, Asifa
,
Gannie, Mohammad Rafiq
Published 2015
Get full text
Get full text
Get full text
Get full text
5
DFAM: A distributed feedback analysis mechanism for knowledge based educational big data
by
Olanrewaju, Rashidah Funke
,
Khan, Burhan Ul Islam
,
Mir
,
Roohie
Naaz
,
Baba, Asifa Mehraj
,
Anwar, Farhat
Published 2016
Get full text
Get full text
Get full text
Get full text
Get full text
6
A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem
by
Khan, Burhan ul Islam
,
Olanrewaju, Rashidah Funke
,
Anwar, Farhat
,
Mir
,
Roohie
Naaz
,
Najeeb, Athaur Rahman
Published 2018
Get full text
Get full text
Get full text
Get full text
Get full text
7
Strategic profiling for behaviour visualization of malicious node in MANETs using game theory
by
Khan, Burhan ul Islam
,
Olanrewaju, Rashidah Funke
,
Mir
,
Roohie
Naaz
,
Baba, Asifa
,
Adebayo, Balagon Wasiu
Published 2015
Get full text
Get full text
Get full text
Get full text
8
DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network
by
Khan, Burhan ul Islam
,
Olanrewaju, Rashidah Funke
,
Baba, Asifa Mehraj
,
Mir
,
Roohie
Naaz
,
Lone, Sajad Ahmad
Published 2015
Get full text
Get full text
Get full text
9
A computationally efficient P-LRU based optimal cache heap object replacement policy
by
Khan, Burhan Ul Islam
,
Olanrewaju, Rashidah Funke
,
Mir
,
Roohie
Naaz
,
Khan, Abdul Raouf
,
Yusoff, Siti Hajar
Published 2017
Get full text
Get full text
Get full text
Get full text
10
Trust and resource oriented communication scheme in mobile ad hoc networks
by
Khan, Burhan Ul Islam
,
Olanrewaju, Rashidah Funke
,
Yusoff, Siti Hajar
,
Mir
,
Roohie
Naaz
,
Sanni, Mistura L.
Published 2018
Get full text
Get full text
Get full text
Get full text
Get full text
11
Bayesian signaling game based efficient security model for MANETs
by
Olanrewaju, Rashidah Funke
,
Khan, Burhan Ul Islam
,
Anwar, Farhat
,
Mir
,
Roohie
Naaz
,
Yaacob, Mashkuri
,
Mehraj, Tehseen
Published 2020
Get full text
Get full text
Get full text
Get full text
Get full text
12
RFDA: Reliable framework for data administration based on split-merge policy
by
Olanrewaju, Rashidah Funke
,
Khan, Burhan ul Islam
,
Baba, Asifa Mehraj
,
Mir
,
Roohie
Naaz
,
Lone, Sajaad Ahmad
Published 2016
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
13
RAED: Response Analysis of Educational Data for leveraging knowledge dissemination system
by
Olanrewaju, Rashidah Funke
,
Khan, Burhan Ul Islam
,
Mir
,
Roohie
Naaz
,
Baba, Asifa Mehraj
,
Gannie, Mohammad Rafiq
Published 2015
Get full text
Get full text
Get full text
14
DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network
by
Khan, Burhan ul Islam
,
Olanrewaju, Rashidah Funke
,
Baba, Asifa Mehraj
,
Mir
,
Roohie
Naaz
,
Lone, Sajad Ahmad
Published 2015
Get full text
Get full text
Get full text
15
Internet of things: the concept, inherent security challenges and recommended solutions
by
Khan, Burhan Ul Islam
,
Olanrewaju, Rashidah Funke
,
Anwar, Farhat
,
Mir
,
Roohie
Naaz
,
Oussama, Allama
,
Jusoh, Ahmad Zamani
Published 2019
Get full text
Get full text
Get full text
16
Securing electronic transactions via payment gateways: a systematic review
by
Olanrewaju, Rashidah Funke
,
Khan, Burhan Ul Islam
,
Mattoo, M. Mueen Ul Islam
,
Anwar, Farhat
,
Nordin, Anis Nurashikin
,
Mir
,
Roohie
Naaz
Published 2017
Get full text
Get full text
Get full text
Get full text
Search Tools:
RSS Feed
–
Email Search