Author of the publication

Performance Comparison of Hadoop Based Tools with Commercial ETL Tools - A Case Study.

, , and . BDA, volume 8302 of Lecture Notes in Computer Science, page 176-184. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A quantitative methodology for information security control gap analysis., , and . ICCCS, page 537-540. ACM, (2011)A two-phase quantitative methodology for enterprise information security risk analysis., , , and . CUBE, page 809-815. ACM, (2012)A Structured Control Selection Methodology for Insider Threat Mitigation., , and . CENTERIS/ProjMAN/HCist, volume 181 of Procedia Computer Science, page 1187-1195. Elsevier, (2020)A Novel Software Defined Security Framework for SDN., , , , , and . CRiSIS, volume 14529 of Lecture Notes in Computer Science, page 216-230. Springer, (2023)Attack Difficulty Metric for Assessment of Network Security., and . ARES, page 44:1-44:10. ACM, (2018)Handling of recursion in dataflow model., , , and . ACM Annual Conference, page 189-196. ACM, (1984)A Graph Data Model for Attack Graph Generation and Analysis., and . SNDS, volume 420 of Communications in Computer and Information Science, page 239-250. Springer, (2014)Design and Implementation of a Soft Real Time Fault Tolerant System., , , , and . IWDC, volume 2571 of Lecture Notes in Computer Science, page 319-328. Springer, (2002)GPU accelerated novel particle filtering method., , and . Computing, 96 (8): 749-773 (2014)A Formal Methodology for Modeling Threats to Enterprise Assets., , and . ICISS, volume 8880 of Lecture Notes in Computer Science, page 149-166. Springer, (2014)