CrazyEngineers
Howdy guest!
Dear guest, you must be logged-in to participate on CrazyEngineers. We would love to have you as a member of our community. Consider creating an account or login.
Replies
  • Pensu

    MemberAug 8, 2011

    Just bumping this thread.....guys plz help me, any source, any paper, anything would work.....
    Are you sure? This action cannot be undone.
    Cancel
  • Reya

    MemberAug 8, 2011

    IEEE projects:

    Network security threat assessment model based on fuzzy algorithm

    The Security Mechanism of Network Database

    A new type of intelligent network security model of the campus study

    <a href="https://www.chennaisunday.com/final-year-projects.html" target="_blank" rel="nofollow noopener noreferrer">www.chennaisunday.com</a>


    Are you sure? This action cannot be undone.
    Cancel
Home Channels Search Login Register