Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Development of Intelligent Digital Certificate Fuzzer Tool., , , , , and . ICCSP, page 126-130. ACM, (2017)Massively Scalable Image Processing on the HPCC Systems Big Data Platform., , , , , and . ICSIM, page 26-31. ACM, (2020)A Greedy Approach to Hide Sensitive Frequent Itemsets with Reduced Side Effects., and . REV, 80, page 849-858. Springer, (2019)S-DILS: Framework for Secured Digital Interaction Learning System Using keccak., and . CSOC (2), volume 349 of Advances in Intelligent Systems and Computing, page 175-187. Springer, (2015)RADS: a real-time anomaly detection model for software-defined networks using machine learning., , , , and . Int. J. Inf. Sec., 22 (6): 1881-1891 (December 2023)VR Supermarket: a Virtual Reality Online Shopping Platform with a Dynamic Recommendation System., , , and . AIVR, page 119-123. IEEE, (2021)A framework for secure live migration of virtual machines., , and . ICACCI, page 243-248. IEEE, (2013)Local outlier factor for anomaly detection in HPCC systems., , , and . J. Parallel Distributed Comput., (2024)Siamese Network for Underwater Multiple Object Tracking., , and . ICMLC, page 511-516. ACM, (2017)Key Frame Extraction and Foreground Modelling Using K-Means Clustering., , , and . CICSyN, page 141-145. IEEE, (2015)