Title and Authors Name |
---|
Designing a model for predicting cyber-attack breaches in an untrusted environment by using linear regressing algorithm Mallineni Priyanka Int. J. Circuit Comput. Networking, 2020; 1(1): 22-26 |
Emergency hospital admission prediction using data mining techniques Mekala Ramadarsan Int. J. Circuit Comput. Networking, 2020; 1(1): 27-31 |
Analyzing and detecting faulty nodes in delay tolerant network Budagappa Gari Rasi Int. J. Circuit Comput. Networking, 2020; 1(1): 32-35 |
5g wireless technology: Future of technology Sonika Singh, Amrish Khari Int. J. Circuit Comput. Networking, 2020; 1(1): 36-39 |
Mobile Ad hoc networks security: Challenges and solutions Amrish Khari, Sonika Singh Int. J. Circuit Comput. Networking, 2020; 1(1): 40-44 |
Ensuring regulatory compliance for remote financial operations in the COVID-19 ERA Pradeep Chintale, Hrushikesh Deshmukh and Gopi Desaboyina Int. J. Circuit Comput. Networking, 2020; 1(1): 45-49 |