[1]
G. Shrivastava, "Approaches of network forensic model for investigation", Int. J. Forensic Eng., vol. 3, pp. 195-215, 2017.
[2]
P. Kumar, M. Quadri, K. Sharma, N.N. Gia, and P. Ranjan, "Persistent Cellular Telephony: Enhanced Secure GSM Architecture", Recent Pat. Eng., vol. 12, pp. 23-29, April 2018.
[3]
P.K. Srivastava, R.P. Ojha, K. Sharma, S. Awasthi, and G. Sanyal, "Effect of quarantine and recovery on infectious nodes in wireless sensor network", Intl. J. Sensor Commun. Cont, vol. 8, pp. 25-35, 2018.
[4]
G. Shrivastava, P. Kumar, B.B. Gupta, S. Bala, and N. Dey, Handbook of Research on Network Forensics and Analysis Techniques., 2018.
[5]
A. Dureja, and P. Pahwa, "Analysis of Non-linear Activation Functions for Classification Tasks Using Convolutional Neural Networks", Recent Pat. Comput. Sci., vol. 12, pp. 156-161, 2018.
[6]
T.Y.S. Rao, and P.C. Reddy, "Classification and Retrieval of Images Based on Extensive Context and Content Feature Set", Recent Pat. Comput. Sci., vol. 12, pp. 162-170, 2018.
[7]
S. Gupta, and A. Saxena, "Classification of Operational and Financial Variables Affecting the Bullwhip Effect in Indian Sectors: A Machine Learning Approach", Recent Pat. Comput. Sci., vol. 12, pp. 171-179, 2018.
46
10