Welcome to Ascentz Technologies

Click Here to Download IEEE Titles

Click Here to Download Civil Project Titles

Click Here to Download Embedded - Mechanical - Automobile Titles

Click Here to Download Embedded Titles

Click Here to Download MBA Titles

Click Here to Download MCom Titles

Click Here to Download UG BBA, BCom Titles

Click Here to Download VB 6.0 Titles

  ID   Domain Technology   Title Year View
30 NETWORK SECURITY JAVA REMADD: RESOURCE-EFFICIENT MALICIOUS DOMAINS DETECTOR IN LARGE-SCALE NETWORKS 2020 View
31 NETWORK SECURITY JAVA SOFTWARE-DEFINED NETWORKING-ENABLED HETEROGENEOUS WIRELESS NETWORKS AND APPLICATIONS CONVERGENCE 2020 View
32 NETWORK SECURITY JAVA DISTRIBUTED LOCALIZATION IN WIRELESS SENSOR NETWORKS UNDER DENIAL-OF-SERVICE ATTACKS 2020 View
33 NETWORK SECURITY JAVA INTELLIGENT PROCESSING OF INTRUSION DETECTION DATA 2020 View
34 NETWORK SECURITY JAVA PAGODA: A HYBRID APPROACH TO ENABLE EFFICIENT REAL-TIME PROVENANCE BASED INTRUSION DETECTION IN BIG DATA ENVIRONMENTS 2018 View
35 NETWORK SECURITY JAVA SECURE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE PRESENCE OF COLLUSION ATTACKS 2015 View
36 NETWORK SECURITY JAVA MIO: ENHANCING WIRELESS COMMUNICATIONS SECURITY THROUGH PHYSICAL LAYER MULTIPLE INTER-SYMBOL OBFUSCATION 2015 View
37 NETWORK SECURITY JAVA OPTIMAL PROBABILISTIC ENCRYPTION FOR SECURE DETECTION IN WIRELESS SENSOR NETWORKS 2014 View
38 NETWORK SECURITY JAVA A LIGHTWEIGHT ENCRYPTION SCHEME FOR NETWORK-CODED MOBILE ADHOC NETWORKS 2014 View
156 NETWORK SECURITY DOTNET TRUST AND REPUTATION MANAGEMENT FOR SECURING COLLABORATION IN 5G ACCESS NETWORKS: THE ROAD AHEAD 2020 View
157 NETWORK SECURITY DOTNET EFFICIENT TIME-STABLE GEOCAST ROUTING IN DELAY-TOLERANT VEHICULAR AD-HOC NETWORKS 2020 View
158 NETWORK SECURITY DOTNET ENERGY-AWARE SERVICE SELECTION AND ADAPTATION IN WIRELESS SENSOR NETWORKS WITH QOS GUARANTEE 2020 View
159 NETWORK SECURITY DOTNET AUTHENTICATION BY ENCRYPTED NEGATIVE PASSWORD 2019 View
160 NETWORK SECURITY DOTNET PFP: IMPROVING THE RELIABILITY OF DEDUPLICATION-BASED STORAGE SYSTEMS WITH PER-FILE PARITY 2019 View
162 NETWORK SECURITY DOTNET EFFICIENT INTRUSION DETECTION WITH BLOOM FILTERING IN CONTROLLER AREA NETWORKS (CAN) 2019 View
163 NETWORK SECURITY DOTNET A HIGHLY EFFICIENT SIDE CHANNEL ATTACK WITH PROFILING THROUGH RELEVANCE-LEARNING ON PHYSICAL LEAKAGE INFORMATION 2019 View
164 NETWORK SECURITY DOTNET PEER PREDICTION BASED TRUSTWORTHINESS EVALUATION AND TRUSTWORTHY SERVICE RATING IN SOCIAL NETWORKS 2019 View
165 NETWORK SECURITY DOTNET DROPS: DIVISION AND REPLICATION OF DATA IN CLOUD FOR OPTIMAL PERFORMANCE AND SECURITY 2018 View
166 NETWORK SECURITY DOTNET PRIVACY-PRESERVING LOCATION-BASED SERVICES QUERY SCHEME AGAINST QUANTUM ATTACKS 2018 View
167 NETWORK SECURITY DOTNET DYNAMIC PACKET FORWARDING VERIFICATION IN SDN 2018 View
168 NETWORK SECURITY DOTNET EFFICIENT MULTIFACTOR AUTHENTICATION KEY EXCHANGE SCHEME FOR MOBILE COMMUNICATIONS 2017 View
169 NETWORK SECURITY DOTNET STRONG KEY-EXPOSURE RESILIENT AUDITING FOR SECURE CLOUD STORAGE 2017 View
170 NETWORK SECURITY DOTNET AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS 2016 View
171 NETWORK SECURITY DOTNET A SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD 2016 View
172 NETWORK SECURITY DOTNET DDSGA: A DATA-DRIVEN SEMI-GLOBAL ALIGNMENT APPROACH FOR DETECTING MASQUERADE ATTACKS 2015 View
173 NETWORK SECURITY DOTNET SECURE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE PRESENCE OF COLLUSION ATTACKS 2015 View
174 NETWORK SECURITY DOTNET PRIVACY-PRESERVING DETECTION OF SENSITIVE DATA EXPOSURE 2015 View
175 NETWORK SECURITY DOTNET ANONYMOUS TWO-FACTOR AUTHENTICATION IN DISTRIBUTED SYSTEMS: CERTAIN GOALS ARE BEYOND ATTAINMENT 2015 View
176 NETWORK SECURITY DOTNET CAPTCHA AS GRAPHICAL PASSWORDS?A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS 2014 View
177 NETWORK SECURITY DOTNET SECRET KEY GENERATION IN THE TWO-WAY RELAY CHANNEL WITH ACTIVE ATTACKERS 2014 View
178 NETWORK SECURITY DOTNET DYNAMIC AUTHENTICATION WITH SENSORY INFORMATION FOR THE ACCESS CONTROL SYSTEMS 2014 View