Author of the publication

A Comparative Analysis of Various Deployment Based DDoS Defense Schemes.

, , and . QSHINE, volume 115 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 606-616. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database Systems., , and . ICEIS (1), page 267-272. (2005)A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics., , , , , , and . IEEE Access, (2020)Soft computing techniques for software effort estimation., , and . CoRR, (2013)SEEDRP: a Secure Energy Efficient Dynamic Routing Protocol in Fanets., and . Wirel. Pers. Commun., 120 (2): 1251-1277 (2021)NeuSTIP: A Novel Neuro-Symbolic Model for Link and Time Prediction in Temporal Knowledge Graphs., , , and . CoRR, (2023)Evolutionary Computing Techniques for Software Effort Estimation, , and . (2017)Segmentation of Punjabi Text into Prosodic Unit., and . ICCSE, page 775-779. IEEE, (2019)A Comparative Analysis of Various Deployment Based DDoS Defense Schemes., , and . QSHINE, volume 115 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 606-616. Springer, (2013)Radiological Report Generation from Chest X-ray Images Using Pre-trained Word Embeddings., and . Wirel. Pers. Commun., 133 (4): 2525-2540 (December 2023)Towards a comprehensive Questionnaire Origin and Development Appraisal tool: A literature review and a modified nominal group., , , , , , , and . Educ. Inf., 35 (1): 7-20 (2019)