<p style="margin-bottom: 11px;"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif">Project Reports</span></span></span></p>

<ul>
<li style="margin-left:8px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><a href="https://drive.google.com/file/d/1if-Te2c5Sxc5w9QgIgUqzavdDC7rO4eg/view?…; style="color:#0563c1; text-decoration:underline">DEEP-LEARNING DRIVEN INTRUSION DETECTION SYSTEM FOR SECURING IoMT NETWORKS</a> </span></span></span></li>
<li style="margin-left:8px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><a href="https://drive.google.com/file/d/1JphAJA6s6OpSbJ_o3-JovTQXegXZeiF9/view?…; style="color:#0563c1; text-decoration:underline">TOWARDS PRIVACY PRESRVATION AND EFFECINCY IN FOG SELECTION FOR FEDERATED LEARNING</a></span></span></span></li>
<li style="margin-left:8px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><a href="https://drive.google.com/file/d/12ite4IZvehC2w_HGGK_et18zo3xvbJHI/view?…; style="color:#0563c1; text-decoration:underline">INTERNET-OF-EVIDENCE: A HOLISTIC DIGITAL FORENSICS MODEL FOR PRIVACY PRESEVATION IN THE CLOUD</a></span></span></span></li>
<li style="margin-left:8px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><a href="https://drive.google.com/file/d/1S7etfWJVn8Qb691Mw3umUcEEf4y07mUT/view?…; style="color:#0563c1; text-decoration:underline">DEEP LEARNING-BASED RISK-AWARE MODEL FOR DETECTING MALICIOUS DNS OVER HTTPS TRAFFIC IN DOMAIN NAME SYSTEMS</a></span></span></span></li>
<li style="margin-left:8px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><a href="https://drive.google.com/file/d/1GRpWbRNpmjaaLL3LqzLyw1zlqkv3IZkR/view?…; style="color:#0563c1; text-decoration:underline">BLOCKCHAIN-ENABLED ANTI-COUNTERFEITING VERIFICATION SYSTEM FOR IOT DOMAIN</a></span></span></span></li>
<li style="margin-bottom:11px; margin-left:8px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><a href="https://drive.google.com/file/d/15YwLbXRnnGdT2PUKM5JpKovwCT4EdNds/view?…; style="color:#0563c1; text-decoration:underline">COMPACT HASH FUNCTION IMPLEMENTATION FOR UNILATERAL LIGHT-WEIGHT AUTHENTICATION PROTOCOL IN RFID SYSTEMS</a></span></span></span></li>
<li><span lang="EN-GB" style="font-size:11.0pt"><span style="line-height:107%"><span style="font-family:"Calibri",sans-serif"><a href="https://drive.google.com/file/d/11Yzav0G_uL93ziudzvxQxirYAljNMdc3/view?…; style="color:#0563c1; text-decoration:underline">AUTHENTICATION PROTOCOL BASED ON AES ALGORITHM FOR RFID SYSTEMS</a></span></span></span></li>
</ul>

Last Update Date For Page Content : 15/12/2024 - 11:12 Saudi Arabia Time

Do you like the content ?
Reason
Reason
btn