Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated approach to prevent SQL injection attack and reflected cross site scripting attack., , and . Int. J. Syst. Assur. Eng. Manag., 3 (4): 343-351 (2012)Image denoising using local contrast and adaptive mean in wavelet transform domain., , and . Int. J. Wavelets Multiresolution Inf. Process., (2014)EpiCombFlu: exploring known influenza epitopes and their combination to design a universal influenza vaccine., , , , and . Bioinform., 29 (15): 1904-1907 (2013)Meta Learning for Few-Shot Medical Text Classification., , and . CoRR, (2022)A simulation based optimization approach for spare parts forecasting and selective maintenance., , and . Reliab. Eng. Syst. Saf., (2017)An Efficient and Secure Micro-payment Transaction Using Shell Cryptography., , , , and . QSHINE, volume 115 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 461-469. Springer, (2013)An Adaptive Service Placement Framework in Fog Computing Environment., and . ICACDS (1), volume 1440 of Communications in Computer and Information Science, page 729-738. Springer, (2021)Deploying SDN in GÉANT production network., , , , , , , , , and . NFV-SDN, page 1-2. IEEE, (2017)A lightweight and unsupervised approach for identifying risk events in news articles., , , and . ICDM (Workshops), page 37-43. IEEE, (2023)MuRanker: a mutant ranking tool., , , and . Softw. Test. Verification Reliab., 25 (5-7): 572-604 (2015)