1
Joshi, Amit
2023
Table of Contents:
“...Chapter 1. Implementation of Tweet Stream Summarization for Malicious Tweet Detection -- Chapter 2. Comparative Analysis of A Secure Authentication Protocol For 5g Enabled IoT Network Using Public and Shared Secret Key -- Chapter 3. DDOS Botnet Attack...”2023
Full text
2
Akashe, Shyam
2021
Table of Contents:
“... of leaves using Convolutional Neural Network and Logistic Regression -- A Low Cost IoT Enabled Device for Real Time Air Quality Monitoring System -- Fuzzy-Based Predictive Analytics for Early Detection of disease - a machine learning approach -- A Framework...”2021
Full text