https://pharmaspecific.com/about/
https://www.bng-tech.com/en/
https://viewlike.us
https://acfnews.org/
https://hotel.kirpisoft.com.tr/
https://www.dacyapi.net/iletisim/
https://www.broadcastbuyer.tv/
https://greenhillsacademy.org/
https://aicspht.org.tw/contact/
https://www.alexbureau.com/Contact-Us/
https://pharmaspecific.com/en/
https://gnimaging.com.au/review/
https://chicago43rd.org/
https://www.premitek.com/about.html
https://aircom.stronazen.pl/
https://foodbasketscorp.com/
https://www.jpgida.com/
https://angad.vic.edu.au/contact/
https://hc.kvdesign-bg.com/
https://sunriseearlylearningcenter.com/contact-us/
https://iapwe.org/contact/
https://www.mistralsolutions.com/about-us/
https://www.premitek.com/about.html
https://isc.lviv.ua/en/
https://culturecongress.org.ua/congress-2021/
https://isc.lviv.ua/about/
https://www.asmpf.org.br/
https://oficialdocnet.com.br/contato/

Projects

CLOUD & INFORMATION SECURITY PROJECT

  • Enhanced Obfuscation for Software Protection in Autonomous Vehicular Cloud Computing Platformsv
  • Privacy Preserving AggregationAuthentication Scheme for Safety WarningvSystem in FogCloud Based VANET
  • Cryptoanalysis on a CloudCentric InternetofMedicalThingsEnabled Smart Healthcare System
  • Efficient MultiClient Functional Encryption for Conjunctive Equality and Range Queries
  • Securing RealTime Video Surveillance Data in Vehicular Cloud Computing A Survey
  • Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations A Systematic Testing of Resilience
  • Efficient Implementation of Lightweight Hash Functions on GPU and Quantu Computers for IoT Applications
  • Characterizing Deep Neural Networks on Edge Computing Systems for Object Classification in 3D Point Clouds
  • Dynamic Virtual Machine Consolidation Algorithm Based on Balancing Energy Consumption and Quality of Service
  • Performance Evaluation of OpenSource Endpoint Detection and Response Combining Google Rapid Response and Osquery for Threat Detection
  • A Multiscale Deep Feature for the Instance Segmentation of Water Leakages in Tunnel Using MLS Point Cloud Intensity Images
  • Smart App Attack Hacking Deep Learning Models in Android Apps
  • Container Technologies for ARM Architecture A Comprehensive Survey of the StateoftheArt
  • Security Analysis of SMAKA Secure ManytoMany Authentication and Key Agreement Scheme for Vehicular Networks
  • PrivacyPreserving Deduplication of Sensor Compressed Data in Distributed Fog Computing
  • PrivacyEnhanced and Verifiable Compressed SensingReconstruction for Medical Image Processing on the Cloud
  • Report When Malicious Deniable and Accountable Searchable MessageModeration System
  • Secure Data Storage and Sharing Techniques for Data Protection in Cloud Environments A Systematic Review Analysis and Future Directions
  • A Novel Moving Target Defense Scheme With Physical Unclonable Functions Based Authentication
  • Dynamic Bayesian Network Based Security Analysis for Physical Layer Key Extraction
  • Identity Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier
  • An Efficient Search Method Using Features to Match Joint Keywords on Encrypted Cloud Data
  • Enhancing Leakage Prevention for MapReduce
  • New Hierarchical FingerVein Feature Extraction Method for iVehicles
  • An Efficient IdentityBased Provable Data Possession Protocol With Compressed Cloud Storage