Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Magalingam, Pritheega
add a person with the name Magalingam, Pritheega
 

Other publications of authors with the same name

Using shortest path to discover criminal community., , and . Digital Investigation, (2015)A Conceptual Model to Identify Illegal Activities on the Bitcoin System., , , , and . ACeS, volume 1487 of Communications in Computer and Information Science, page 18-34. Springer, (2021)Digital Evidence Retrieval and Forensic Analysis on Gambling Machine., , , and . ICDF2C, volume 31 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 111-121. Springer, (2009)Hospital Information System for Motivating Patient Loyalty: A Systematic Literature Review., , , and . IRICT, volume 72 of Lecture Notes on Data Engineering and Communications Technologies, page 189-198. Springer, (2020)Penetration Testing for IoT Security: The Case Study of a Wireless IP Security CAM., , , , and . ICAIC, page 1-5. IEEE, (2023)A Novel Approach for Audio Watermarking., , , , and . IAS, page 83-86. IEEE Computer Society, (2009)Ranking the Importance Level of Intermediaries to a Criminal using a Reliance Measure., , and . CoRR, (2015)Detecting False Messages in the Smartphone Fault Reporting System., , , , , , and . IRICT, volume 1073 of Advances in Intelligent Systems and Computing, page 759-768. Springer, (2019)Evolution of Industry and Blockchain Era: Monitoring Price Hike and Corruption Using BIoT for Smart Government and Industry 4.0., , , , , , , , and . IEEE Trans. Ind. Informatics, 18 (12): 9153-9161 (2022)Analysing Log Files For Web Intrusion Investigation Using Hadoop., , , , and . ICSIE, page 12-21. ACM, (2018)