Author of the publication

An Optimal Dynamic Threat Evaluation and Weapon Scheduling Technique.

, and . SGAI Conf., page 437-450. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Optimal Dynamic Threat Evaluation and Weapon Scheduling Technique., and . SGAI Conf., page 437-450. Springer, (2009)Fingerprint Enhancement and Reconstruction., and . ICIC (2), volume 5755 of Lecture Notes in Computer Science, page 660-669. Springer, (2009)Role of Corner Detection in Capturing Shape Outlines., and . JCIS, Atlantis Press, (2006)Security, Safety and Trust Management (SSTM '17)., , , , and . WETICE, page 242-243. IEEE Computer Society, (2017)Handling Insider Threat Through Supervised Machine Learning Techniques., , , and . EUSPN/ICTH, volume 177 of Procedia Computer Science, page 64-71. Elsevier, (2020)Capturing outlines of 2D objects with Bézier cubic approximation., and . Image Vis. Comput., 27 (6): 704-712 (2009)Development of A Robust Privacy Enhancing Data-Sharing Framework for Healthcare System Based on Decentralized Control., , , and . ANZCC, page 224-229. IEEE, (2022)Textual analysis of traitor-based dataset through semi supervised machine learning., , , , and . Future Gener. Comput. Syst., (2021)Diving Deep With BotLab-DS1: A Novel Ground Truth-Empowered Botnet Dataset., , , , , and . IEEE Access, (2024)Efficient Representation of Zooming Information in Videos Using Multi Resolution Mosaics., and . ICIC (2), volume 6216 of Lecture Notes in Computer Science, page 294-300. Springer, (2010)