Author of the publication

Large Scale Graph Based Network Forensics Analysis.

, , and . ICPR Workshops (5), volume 12665 of Lecture Notes in Computer Science, page 457-469. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Informational and linguistic analysis of large genomic sequence collections via efficient Hadoop cluster algorithms., , , and . Bioinform., 34 (11): 1826-1833 (2018)Maintaining Dynamic Minimum Spanning Trees: An Experimental Study., , , and . ALENEX, volume 2409 of Lecture Notes in Computer Science, page 111-125. Springer, (2002)Experimental Evaluation of an Algorithm for the Detection of Tampered JPEG Images., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 643-652. Springer, (2014)Using Software Visualization for Supporting the Teaching of MapReduce.. NSS, volume 11058 of Lecture Notes in Computer Science, page 349-360. Springer, (2018)A Lightweight Security Model for WBEM., , , and . OTM Workshops, volume 2889 of Lecture Notes in Computer Science, page 975-988. Springer, (2003)The Price of Resiliency: a Case Study on Sorting with Memory Faults., , and . Algorithmica, 53 (4): 597-620 (2009)Biconnectivity of Social and Web Graphs., , , and . SEBD, page 54-65. Matematicamente.it, (2016)Large Scale Graph Based Network Forensics Analysis., , and . ICPR Workshops (5), volume 12665 of Lecture Notes in Computer Science, page 457-469. Springer, (2020)An Efficient Implementation of the Algorithm by Lukáš et al. on Hadoop., , , , and . GPC, volume 10232 of Lecture Notes in Computer Science, page 475-489. (2017)TRUST: TRust Unguarded Service Terminals., , , , , and . I-SPAN, volume 1080 of Communications in Computer and Information Science, page 155-169. Springer, (2019)