Your selections:
A robust forgery detection method for copy-move and splicing attacks in images
- Islam, Mohammad, Karmakar, Gour, Kamruzzaman, Joarder, Murshed, Manzur
- Islam, Mohammad, Karmakar, Gour, Kamruzzaman, Joarder, Murshed, Manzur
Cybersecurity risks in meat processing plant and impacts on total productive maintenance
- Chundhoo, Vickram, Chattopadhyay, Gopinath, Karmakar, Gour, Appuhamillage, Gayan
Security of Internet of Things devices : ethical hacking a drone and its mitigation strategies
- Karmakar, Gour, Petty, Mark, Ahmed, Hassan, Das, Rajkumar, Kamruzzaman, Joarder
Obfuscated memory malware detection in resource-constrained iot devices for smart city applications
- Shafin, Sakib, Karmakar, Gour, Mareels, Iven
Are you sure you would like to clear your session, including search history and login status?