Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Location-aware IT system security using IoT in multizone., and . MobiCom, page 847-849. ACM, (2022)XSSDM: Towards detection and mitigation of cross-site scripting vulnerabilities in web applications., , , and . ICACCI, page 2010-2015. IEEE, (2015)Text-Mining and Pattern-Matching based Prediction Models for Detecting Vulnerable Files in Web Applications., , and . J. Web Eng., 17 (1&2): 28-44 (2018)Protecting software design in cloud using AWS IoT., and . MobiSys, page 561-562. ACM, (2022)An Efficient Hybrid Approach for Intrusion Detection in Cyber Traffic Using Autoencoders., , and . SN Comput. Sci., 4 (5): 498 (September 2023)AI Empowered Big Data Analytics for Industrial Applications., , , , and . J. Univers. Comput. Sci., 28 (9): 877-881 (2022)Screening and insilico analysis of deleterious nsSNPs (missense) in human CSF3 for their effects on protein structure, stability and function., , and . Comput. Biol. Chem., (2019)Importance of Basic Principles of Design in Creating Spaces. International Journal of Trend in Scientific Research and Development, 5 (4): 911-916 (June 2021)Significance of Basic Design Elements in Spatial and Cultural Environment of Built Forms. International Journal of Trend in Scientific Research and Development, 5 (4): 917-925 (June 2021)Neural Network and Applications An Overview. International Journal of Trend in Scientific Research and Development, 5 (4): 23-24 (June 2021)