Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information security risks management framework - A step towards mitigating security risks in university network., and . J. Inf. Secur. Appl., (2017)Implementing New-age Authentication Techniques using OpenID for Security Automation, , , and . CoRR, (2010)Designing secure email infrastructure., , , and . WOCN, page 1-9. IEEE, (2012)A framework for zero-day vulnerabilities detection and prioritization., , and . J. Inf. Secur. Appl., (2019)A model for quantitative security measurement and prioritisation of vulnerability mitigation., and . Int. J. Secur. Networks, 8 (3): 139-153 (2013)Query Processing and Optimization of Parallel Database System in Multi Processor Environments., , , and . Asia International Conference on Modelling and Simulation, page 191-194. IEEE Computer Society, (2012)Design And Implementation of Two Axis Sun Follower PV System., , , , , and . IC3I, page 2046-2050. IEEE, (2023)Data mining: Prediction for performance improvement of graduate students using classification., , , and . WOCN, page 1-5. IEEE, (2012)Evaluation of severity index of vulnerability categories., and . Int. J. Inf. Comput. Secur., 5 (4): 275-289 (2013)Quantitative Information Security Risk Assessment Model for University Computing Environment., and . ICIT, page 69-74. IEEE, (2016)