Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploitability analysis using predictive cybersecurity framework., and . CYBCONF, page 317-323. IEEE, (2015)On the Use of Containers in High Performance Computing Environments., , , and . CLOUD, page 284-293. IEEE, (2020)Proteome-scale Deployment of Protein Structure Prediction Workflows on the Summit Supercomputer., , , , , , and . IPDPS Workshops, page 206-215. IEEE, (2022)Predictive Cyber-security Analytics Framework: A non-homogenous Markov model for Security Quantification., and . CoRR, (2015)A Novel Architecture for Predictive CyberSecurity Using Non-homogenous Markov Models., and . TrustCom/BigDataSE/ISPA (1), page 774-781. IEEE, (2015)Security architecture for resource-limited environments., , and . IWCMC, page 412-417. IEEE, (2011)High-Performance Deep Learning Toolbox for Genome-Scale Prediction of Protein Structure and Function., , , , , , , , , and 7 other author(s). MLHPC@SC, page 46-57. IEEE, (2021)Enhancing Web Services Availability., , and . ICEBE, page 352-355. IEEE Computer Society, (2005)Fair BPEL Processes Transaction using Non-Repudiation Protocols., , , and . IEEE SCC, page 337-342. IEEE Computer Society, (2005)A Predictive Framework for Cyber Security Analytics using Attack Graphs., and . CoRR, (2015)