Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classification of Research Citations (CRC)., , , , , and . CLBib@ISSI, volume 1384 of CEUR Workshop Proceedings, page 18-27. CEUR-WS.org, (2015)Experimental Analysis of the Facial Expression Recognition of Male and Female., , , and . CSAE, page 26:1-26:5. ACM, (2019)Treatment of Reactive Routing Protocols Using Second Chance Based On Malicious Behavior of Nodes in MANETS., , , and . CoRR, (2017)Cloud Service ranking using Checkpoint based Load balancing in real time scheduling of Cloud Computing., , , and . CoRR, (2019)Light-activated photocurrent degradation and self-healing in perovskite solar cells, , , , , , , , , and 4 other author(s). Nature Communication, (2016)A constraint based role based access control in the SECTET a model-driven approach., , and . PST, volume 380 of ACM International Conference Proceeding Series, page 13. ACM, (2006)Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET., , and . PST, volume 380 of ACM International Conference Proceeding Series, page 44. ACM, (2006)Towards a MOF/QVT-Based Domain Architecture for Model Driven Security., , and . MoDELS, volume 4199 of Lecture Notes in Computer Science, page 275-290. Springer, (2006)Editorial: Dependable and Real-time Vehicular Communication for Intelligent Transportation Systems (ITS)., , , , and . Mob. Networks Appl., 23 (5): 1129-1131 (2018)Communication Security in the Internet of Vehicles based Industrial Value Chain., , and . CoRR, (2023)