Risk Profile: Findings from the Field
in Risks in Agriculture : Farmers' Perspective, Parikh A., SpringerBriefs in Economics. Springer, Singapore pp. 61-84. doi: 10.1007/978-981-10-6271-1_4
Message from the technical program chairs
Information Systems Security, Lecture Notes in Computer Science 6503, by Somesh Jha, Anish Mathuria (Eds.) Springer-Verlag, Berlin, Heidelberg, Dec. 2010, pp. VII 10.1007/978-3-642-17714-9
Whose Bollywood is this anyway? : Exploring critical frameworks for studying popular Hindi cinema
in Critical Pedagogy, Race, and Media : Diversity and Inclusion in Higher Education Teaching, Susan Flynn, Melanie A. Marotta (eds), Routledge, London pp.141-154 doi: 10.4324/9781003222835-10
Semi-inner Product: Application to Frame Theory and Numerical Range of Operators
in Mathematics and Computing 2013, Ram N. Mohapatra, [et al.], ed. New Delhi, Springer pp 77-90. Doi: 10.1007/978-81-322-1952-1_6
Security and Privacy Issues in Outsourced Personal Health Record
in Research advances in Cloud Computing, Sanjay Chaudhary, Gaurav Somani, Rajkumar Buyya, (eds), Singapore: Springer, pp. 431-447. doi: 10.1007/978-981-10-5026-8_17
Analysis of normal and pathological voices by novel chaotic titration method
in Signal and Acoustic Modelling for Speech and Communication Disorders, Hemant A. Patil, Amy Neustein, and Manisha Kulshetra, (eds), Berlin: De Gruyter, pp. 87-120. doi: 10.1515/9781501502415
Performance Analysis of Mixed-Wall CNT Interconnects Using Colliding Bodies Optimization Technique
in Major Applications of Carbon Nanotube Field-Effect Transistors (CNTFET), Balwinder Raj, Mamta Khosla and Amandeep Singh, (eds), USA: IGI Global pp. 189-211 doi: 10.4018/978-1-7998-1393-4.ch009.
Securing Digital Image with Authentication Code
in Computer Vision and Image Processing in Intelligent Systems and Multimedia Technologies, Muhammad Sarfraz, (ed), Pennsylvania, USA: IGI Global pp. 203-215. Doi:10.4018/978-1-4666-6030-4.ch011
Privacy and Accountability Concerns in the Age of Big Data
in Big Data: Storage, Sharing, and Security, Fei Hu (ed), CRC Press, pp. 341-356. DOI: 10.1201/b19694-17
Blind steganalysis using machine intelligence
in Computational Techniques and Algorithms for Image Processing, S. Ramakrishnan and Ibrahiem M. M. El Emary Ed. Saarbr cken: Lambert Academic Publishing (LAP),