https://www.sswfoundation.com/contact.php
https://www.opstechmedia.com/contact.php
https://multigestionasesores.com/contacts/
https://turiimar.com/vuelos
https://bulletnutrition.in/contact/
https://dijitalnesilakademisi.com/blog.php
https://dentcases.com/faq/
https://www.eldernunes.com.br/politica-de-privacidade/
https://topupburgers.com/contact-us/
https://realestatemallindia.com/about
https://mateuscarlini.com.br/faq/
https://amazonoffice.arq.br/
https://angrezimitra.com/shop/
https://www.drpratap.com/services/
https://petzaiastore.com.br/contact-us/
https://www.amconstrotech.com/about-us.php
https://drsonamsdentalstudio.com/blog/
https://trsurfboards.com.br/contact/
https://www.siriusrealestateturkey.com/hakkimizda/
https://realestatemallindia.com/about
https://nisaprefabrik.com/iletisim/
https://www.buturac-gradnja.hr/usluge/
https://techilan.com/faq
https://beautyblessed.ca/contact-us/
https://sridashrathraoguruji.com/about.php
https://incredibleevents.com/game-shows/
https://urdu.alilmunnafayfoundation.com/
https://lifestyle.wowwaves.com/category/beauty/
https://vumacbd.com/about-us/
https://bibart.in/contact-us/
https://www.glg.com.ge/aboutus.html

Projects

CYBER SECURITY PROJECT

  • Evaluation of Critical Node Groups in CyberPhysical Power Systems Based on Pinning Control Theory
  • CyberPhysical Attack Conduction and Detection in Decentralized Power Systems
  • Emerging Technologies for Next Generation Remote Health Care and Assisted Living
  • Networked Security ObserverBased Reference Tracking Control of Stochastic Quadrotor UAV System Under CyberAttackTS Fuzzy Approach
  • Optimizing Implementations of NonProfiled Deep LearningBased SideChannel Attacks
  • Cyber Attack Detection and Isolation for a Quadrotor UAV With Modified Sliding Innovation Sequences
  • Machine Learning Based MultiAgent System for Detecting and Neutralizing Unseen CyberAttacks in AGC and HVDC Systems
  • Blockchain for Industry 50 Vision Opportunities Key Enablers and Future Directions
  • Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks
  • Brain Tumor and Glioma Grade Classification Using Gaussian Convolutional Neural Network
  • A Highly Discriminative Detector Against False Data Injection Attacks in AC State Estimation
  • Combining LongTerm Recurrent Convolutional and Graph Convolutional Networks to Detect Phishing Sites Using URL and HTML
  • RealTime Detection of False Readings in Smart Grid AMI Using Deep and Ensemble Learning
  • CyberAttack on P2P Energy Transaction Between Connected Electric Vehicles A False Data Injection Detection Based Machine Learning Model
  • Wireless Radar Sensor Networks Epidemiological Modeling and Optimization
  • Cheating and Detection Method in Massively Multiplayer Online RolePlaying Game Systematic Literature Review
  • A BiometricsBased Behavioral Trust Framework for Continuous Mobile Crowd Sensing Recruitment
  • Asymptotically Guaranteed AntiJamming Spread Spectrum Random Access Without PreShared Secret *
  • A Generalized Hold Based Countermeasure Against ZeroDynamics Attack With Application to DCDC Converter
  • Helper Data Masking for Physically Unclonable FunctionBased Key Generation Algorithms
  • A Comprehensive Analysis of Todays Malware and Its Distribution Network Common Adversary Strategies and Implications
  • A Novel Multipurpose Watermarking Scheme Capable of Protecting and Authenticating Images With Tamper Detection and Localisation Abilities
  • A Comprehensive Review of Cybersecurity in InverterBased Smart Power System Amid the Boom of Renewable Energy
  • DynamicLineRatingBased Robust Corrective Dispatch Against Load Redistribution Attacks With Unknown Objective
  • Information Dissemination With ServiceOriented Incentive Mechanism in Industrial Internet of Things