https://www.sswfoundation.com/contact.php
https://www.opstechmedia.com/contact.php
https://multigestionasesores.com/contacts/
https://turiimar.com/vuelos
https://bulletnutrition.in/contact/
https://dijitalnesilakademisi.com/blog.php
https://dentcases.com/faq/
https://www.eldernunes.com.br/politica-de-privacidade/
https://topupburgers.com/contact-us/
https://realestatemallindia.com/about
https://mateuscarlini.com.br/faq/
https://amazonoffice.arq.br/
https://angrezimitra.com/shop/
https://www.drpratap.com/services/
https://petzaiastore.com.br/contact-us/
https://www.amconstrotech.com/about-us.php
https://drsonamsdentalstudio.com/blog/
https://trsurfboards.com.br/contact/
https://www.siriusrealestateturkey.com/hakkimizda/
https://realestatemallindia.com/about
https://nisaprefabrik.com/iletisim/
https://www.buturac-gradnja.hr/usluge/
https://techilan.com/faq
https://beautyblessed.ca/contact-us/
https://sridashrathraoguruji.com/about.php
https://incredibleevents.com/game-shows/
https://urdu.alilmunnafayfoundation.com/
https://lifestyle.wowwaves.com/category/beauty/
https://vumacbd.com/about-us/
https://bibart.in/contact-us/
https://www.glg.com.ge/aboutus.html

Projects

CLOUD & INFORMATION SECURITY PROJECT

  • Enhanced Obfuscation for Software Protection in Autonomous Vehicular Cloud Computing Platformsv
  • Privacy Preserving AggregationAuthentication Scheme for Safety WarningvSystem in FogCloud Based VANET
  • Cryptoanalysis on a CloudCentric InternetofMedicalThingsEnabled Smart Healthcare System
  • Efficient MultiClient Functional Encryption for Conjunctive Equality and Range Queries
  • Securing RealTime Video Surveillance Data in Vehicular Cloud Computing A Survey
  • Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations A Systematic Testing of Resilience
  • Efficient Implementation of Lightweight Hash Functions on GPU and Quantu Computers for IoT Applications
  • Characterizing Deep Neural Networks on Edge Computing Systems for Object Classification in 3D Point Clouds
  • Dynamic Virtual Machine Consolidation Algorithm Based on Balancing Energy Consumption and Quality of Service
  • Performance Evaluation of OpenSource Endpoint Detection and Response Combining Google Rapid Response and Osquery for Threat Detection
  • A Multiscale Deep Feature for the Instance Segmentation of Water Leakages in Tunnel Using MLS Point Cloud Intensity Images
  • Smart App Attack Hacking Deep Learning Models in Android Apps
  • Container Technologies for ARM Architecture A Comprehensive Survey of the StateoftheArt
  • Security Analysis of SMAKA Secure ManytoMany Authentication and Key Agreement Scheme for Vehicular Networks
  • PrivacyPreserving Deduplication of Sensor Compressed Data in Distributed Fog Computing
  • PrivacyEnhanced and Verifiable Compressed SensingReconstruction for Medical Image Processing on the Cloud
  • Report When Malicious Deniable and Accountable Searchable MessageModeration System
  • Secure Data Storage and Sharing Techniques for Data Protection in Cloud Environments A Systematic Review Analysis and Future Directions
  • A Novel Moving Target Defense Scheme With Physical Unclonable Functions Based Authentication
  • Dynamic Bayesian Network Based Security Analysis for Physical Layer Key Extraction
  • Identity Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier
  • An Efficient Search Method Using Features to Match Joint Keywords on Encrypted Cloud Data
  • Enhancing Leakage Prevention for MapReduce
  • New Hierarchical FingerVein Feature Extraction Method for iVehicles
  • An Efficient IdentityBased Provable Data Possession Protocol With Compressed Cloud Storage