Author of the publication

A Self-learning Personal Privacy Assistant.

, and . AINA, volume 1151 of Advances in Intelligent Systems and Computing, page 276-287. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multilevel Threshold Secret Sharing in Distributed Cloud., , , and . SSCC, volume 536 of Communications in Computer and Information Science, page 13-23. Springer, (2015)Location-Triggered Routing Protocol in Mobile Ad Hoc Networks., and . NCA, page 261-268. IEEE Computer Society, (2004)An Empirical Approach to Detection of Topic Bubbles in Tweets., , and . BDC, page 31-40. IEEE Computer Society, (2015)Dynamic Workload Balancing for Hadoop MapReduce., , , and . BDCloud, page 56-62. IEEE Computer Society, (2014)Modelling of Assembly Partitions for a Distributed Environment., and . ICRA (2), page 52-57. IEEE Computer Society Press, (1993)Sector-based routing for secure energy efficient communications., , , and . WCNC, page 457-462. IEEE, (2006)Real Stock Trading Using Soft Computing Models., , , and . ITCC (2), page 162-167. IEEE Computer Society, (2005)isbn: 0-7695-2315-3.Reducing Latency in Ad Hoc Networks by Pre-Fetching., , and . International Conference on Wireless Networks, page 952-958. CSREA Press, (2004)Cleaning Framework for BigData: An Interactive Approach for Data Cleaning., , , and . BigDataService, page 174-181. IEEE Computer Society, (2016)Multimedia, network protocols and users - bridging the gap., , and . ACM Multimedia (1), page 473-476. ACM, (1999)