• HOME
  • Search & Results
  • Full Text
  • Thesis Details
 
Page: 239
 
Full Screen

  • Title
  • Plagiarism Certificate
  • Dedication
  • Declaration
  • Certificate
  • Abstract
  • Acknowledgement
  • Contents
  • List of Tables
  • List of Figures
  • Abbreviations
  • List of Appendices
  • List of Publications
  • List of Symbols
  • 1. Introduction
  • 2. Review of literature
  • 3. Two player security game approach based co resident DOS attack..
  • 4. State observation based coresident DOS attack detection to ensure security for cloud environment
  • 5.An improved relevance vector machine with fuzzy C-means clustering based ....
  • Conclusion
  • Bibliography
  • Appendices