| RTT-Based Random Walk Approach to Detect Stepping-Stone Intrusion – NS2 FOR B.TECH | 
| Physical access control: A case study in a military institution of the Brazil– NS2 FOR B.TECH | 
| Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential component– NS2 FOR B.TECH | 
| Language-based security analysis of database applications– NS2 FOR B.TECH | 
| Automatic and secured backup and restore technique in Android– NS2 FOR B.TECH | 
| The Electronic Voting in the Presence of Rational Voters– NS2 FOR B.TECH | 
| Criminal data mining: A case studyin Criminal Observatory Tapajós– NS2 FOR B.TECH | 
| Distributed trust protocol for IaaS Cloud Computing– NS2 FOR B.TECH | 
| Defending flooding attack in Delay Tolerant Networks– NS2 FOR B.TECH | 
| Inside Attack Filtering for Robust Sensor Localization– NS2 FOR B.TECH | 
| Spy: A QoS-Aware Anonymous Multi-Cloud Storage System Supporting DSSE– NS2 FOR B.TECH | 
| Passing Go with DNA Sequencing: Delivering Messages in a Covert Transgenic Channel– NS2 FOR B.TECH | 
| Multi-tier network secrecy in the ether– NS2 FOR B.TECH | 
| A Scalable Feedback Mechanism for Distributed Nullforming With Phase-Only Adaptation– NS2 FOR B.TECH | 
| Potential Cyberattacks on Automated Vehicles– NS2 FOR B.TECH | 
| An approach to assess the optimality of refining RC4– NS2 FOR B.TECH | 
| Interoperable job execution and data access through UNICORE and the Global Federated File System– NS2 FOR B.TECH | 
| EM attack sensor: Concept, circuit, and design-automation methodology– NS2 FOR B.TECH | 
| Novel Test-Mode-Only Scan Attack and Countermeasure for Compression-Based Scan Architectures– NS2 FOR B.TECH | 
| Quantifying the Information Leakage in Timing Side Channels in Deterministic Work-Conserving Schedulers– NS2 FOR B.TECH | 
| Analysis of a “/0” Stealth Scan From a Botnet– NS2 FOR B.TECH | 
| Design of secured intra-prediction mode algorithm for data hiding with improved image quality– NS2 FOR B.TECH | 
| Unveiling flat traffic on the Internet: An SSH attack case study– NS2 FOR B.TECH | 
| Privacy-Aware Genome Mining: Server-Assisted Protocols for Private Set Intersection and Pattern Matching– NS2 FOR B.TECH | 
| e-commerce cloud: Opportunities and challenges– NS2 FOR B.TECH | 
| 2015 IEEE NS2 FOR B.TECH |