Author of the publication

Developing Software Based Key logger and a Method to Protect from Unknown Key loggers

, , and . International Journal of Innovative Science and Modern Engineering (IJISME), 3 (7): 1-3 (June 2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced optimal placements of multi-controllers in SDN., and . J. Ambient Intell. Humaniz. Comput., 12 (7): 8187-8204 (2021)Chapter Three - Residential energy management system (REMS) using machine learning., and . Adv. Comput., (2024)Prediction Based Dynamic Controller Placement in SDN., and . EAI Endorsed Trans. Scalable Inf. Syst., 8 (32): e6 (2021)Traffic-aware dynamic controller placement in SDN using NFV., and . J. Supercomput., 79 (2): 2082-2107 (2023)Exploring Potential Audio Features for Respiratory Disorder Detection with COVID-19., , and . ICCCNT, page 1-7. IEEE, (2023)An incremental learning temporal influence model for identifying topical influencers on Twitter dataset., and . Soc. Netw. Anal. Min., 11 (1): 27 (2021)Big Data Analytics: A Brief Survey. International Journal of Trend in Scientific Research and Development, 2 (4): 2264-2268 (June 2018)