Personal Information
Entreprise/Lieu de travail
Rajkot Area, India India
Profession
Assistant Professor
Mots-clés
security
android
security issues in manet
manet
os
integrity
availability
confidentiality
threats
threats in database
database
database security
security in database
os security
vulnerabilities in android os
security in android
android security
vulnerability
vulnerabilities
vulnerabilities in android
blackhole attck prevention in aodv
aodv protocol
blackhole attack detection in manet
blackhole attack detection in aodv
blackhole attack
black hole
attack
aodv
introduction to 5g
difference between 3g and 4g
5g technology
difference between 2g and 3g
5g
difference between 4g and 5g
difference between 1g and 2g
security issues in mobile ad-hoc network
mobile ad-hoc network
routing in dsr protocol
routing protocol in ad-hoc network
routing protocol in mobile ad-hoc network
routing
dsr routing protocol
dsr routing
dsr
secure routing
routing in dsr
secure routing in dsr
j2me application
application
j2me mobile application
j2me
mobile application
security comparition of android and ios
encryption in ios
encryption in android
android vs ios encryption
android vs ios encryption system
encryption
ios
birjutank27
evolutionary prototyping
throw away prototyping
prototype
software
software prototyping
cyber security
setup
laboratory
lab
cyber
cyberwar
mining
data
data mining
bigdata
icecream sandwitch
jellybean
kitkat
gingerbread
mobile
wireless
broadband
vmware
virtualization
virtualisation
Tout plus
Présentations
(14)Documents
(1)J’aime
(5)IoT Standards: The Next Generation
ReadWrite
•
il y a 8 ans
On demand multicast
Kamal Patel
•
il y a 9 ans
Ios forensics
Kamal Patel
•
il y a 9 ans
Interview skills
Kamal Patel
•
il y a 9 ans
NEtwork Security Admin Portal
Bhadreshsinh Gohil
•
il y a 11 ans
Personal Information
Entreprise/Lieu de travail
Rajkot Area, India India
Profession
Assistant Professor
Mots-clés
security
android
security issues in manet
manet
os
integrity
availability
confidentiality
threats
threats in database
database
database security
security in database
os security
vulnerabilities in android os
security in android
android security
vulnerability
vulnerabilities
vulnerabilities in android
blackhole attck prevention in aodv
aodv protocol
blackhole attack detection in manet
blackhole attack detection in aodv
blackhole attack
black hole
attack
aodv
introduction to 5g
difference between 3g and 4g
5g technology
difference between 2g and 3g
5g
difference between 4g and 5g
difference between 1g and 2g
security issues in mobile ad-hoc network
mobile ad-hoc network
routing in dsr protocol
routing protocol in ad-hoc network
routing protocol in mobile ad-hoc network
routing
dsr routing protocol
dsr routing
dsr
secure routing
routing in dsr
secure routing in dsr
j2me application
application
j2me mobile application
j2me
mobile application
security comparition of android and ios
encryption in ios
encryption in android
android vs ios encryption
android vs ios encryption system
encryption
ios
birjutank27
evolutionary prototyping
throw away prototyping
prototype
software
software prototyping
cyber security
setup
laboratory
lab
cyber
cyberwar
mining
data
data mining
bigdata
icecream sandwitch
jellybean
kitkat
gingerbread
mobile
wireless
broadband
vmware
virtualization
virtualisation
Tout plus