Your selections:
Wireless sensor network protocols applicable to RFID sytem
- Azad, Arman, Kamruzzaman, Joarder, Karmakar, Nemai
The co-evolution of cloud and IoT applications : recent and future trends
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder
Survey of recent cyber security attacks on robotic systems and their mitigation approaches
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder
Wireless security and privacy issues
Security and privacy issues in RFID systems
- Kamruzzaman, Joarder, Azad, Arman, Karmakar, Nemai, Karmakar, Gour, Srinivasan, Bala
Object analysis with visual sensors and RFID
- Karmakar, Gour, Karmakar, Nemai, Dooley, Laurence, Kamruzzaman, Joarder
Object analysis with visual sensors and RFID
- Karmakar, Gour, Dooley, Laurence, Karmakar, Nemai, Kamruzzaman, Joarder
Mobile malware detection : an analysis of deep learning model
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq, Rahman, Ashfaqur, IEEE
Are you sure you would like to clear your session, including search history and login status?