Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Divide and Conquer Method for Achieving High Speed Division in Hardware., , , and . ASP-DAC/VLSI Design, page 535-540. IEEE Computer Society, (2002)An Approach to the Value-based Modeling of Information Flows., , and . Inf. Soc., 13 (1): 93-105 (1997)PRICAR: Privacy Framework for Vehicular Data Sharing with Third Parties., , , , , and . SecDev, page 184-195. IEEE, (2023)Hybrid machine learning approach based intrusion detection in cloud: A metaheuristic assisted model., , , , and . Multiagent Grid Syst., 18 (1): 21-43 (2022)Byzantine-Resilient Controller Mapping and Remapping in Software Defined Networks., , and . IEEE Trans. Netw. Sci. Eng., 7 (4): 2714-2729 (2020)Towards a Taxonomy for Globally Distributed Work.. AMCIS, page 110. Association for Information Systems, (2006)Dynamic Attack-Resilient Routing in Software Defined Networks., , and . IEEE Trans. Network and Service Management, 15 (3): 1146-1160 (2018)Crossfire Attack Detection using Deep Learning in Software Defined ITS Networks., , , and . CoRR, (2018)A Problem-Solving Framework for IS Resources Management.. PACIS, page 64. AISeL, (1993)Fast and Adaptive Failure Recovery using Machine Learning in Software Defined Networks., , , and . ICC Workshops, page 1-6. IEEE, (2019)