Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Region Based Extensive Response Index Pattern for Facial Expression Recognition., , and . CoRR, (2018)EXPERTNet: Exigent Features Preservative Network for Facial Expression Recognition., , , and . ICVGIP, page 21:1-21:8. ACM, (2018)LEARNet: Dynamic Imaging Network for Micro Expression Recognition., , , and . IEEE Trans. Image Process., (2020)A shortest path approach to SPARQL chain query optimisation., , and . ICACCI, page 1778. IEEE, (2017)Brokering in interconnected cloud computing environments: A survey., , , , and . J. Parallel Distributed Comput., (2019)Text-Mining and Pattern-Matching based Prediction Models for Detecting Vulnerable Files in Web Applications., , and . J. Web Eng., 17 (1&2): 28-44 (2018)Security Requirements Elicitation and Modeling Authorizations., , and . SSCC, volume 625 of Communications in Computer and Information Science, page 239-250. Springer, (2016)Security Requirements Elicitation and Assessment Mechanism (SecREAM)., , and . ICACCI, page 1862-1866. IEEE, (2015)A secure software design methodology., , and . ICACCI, page 2484-2488. IEEE, (2016)Energy-efficient fuzzy-based approach for dynamic virtual machine consolidation., , , , and . Int. J. Grid Util. Comput., 10 (4): 308-325 (2019)