Author of the publication

Incorporating Behavior in Attribute Based Access Control Model Using Machine Learning.

, , and . SysCon, page 1-8. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Objective-Aware Reputation-Enabled Blockchain-Based Federated Learning., , and . BLOCKCHAIN, volume 595 of Lecture Notes in Networks and Systems, page 259-268. Springer, (2022)Privacy-Preserving Statistical Analysis of Health Data Using Paillier Homomorphic Encryption and Permissioned Blockchain., and . IEEE BigData, page 5474-5479. IEEE, (2019)Privacy Preserving k-Means Clustering in Multi-Party Environment., , and . SECRYPT, page 381-385. INSTICC Press, (2007)Effective Neural Team Formation via Negative Samples., , and . CIKM, page 3908-3912. ACM, (2022)Incorporating Behavior in Attribute Based Access Control Model Using Machine Learning., , and . SysCon, page 1-8. IEEE, (2021)RNBFT: Leveraging Randomness to Achieve Scalable Byzantine Consensus., and . IEEE Big Data, page 2346-2355. IEEE, (2023)SEERa: A Framework for Community Prediction., , and . CIKM, page 4762-4766. ACM, (2022)Towards Scaling Byzantine Consensus Using Random Network Topology And Multi-Signatures., and . BRAINS, page 61-62. IEEE, (2020)Secure two and multi-party association rule mining., and . CISDA, page 1-6. IEEE, (2009)Detecting Relative Changes in Circulating Blood Volume using Ultrasound and Simulation., , , , , , and . CBMS, page 263-268. IEEE, (2019)