Author of the publication

An efficient and scalable algorithm for policy compatibility in service virtualization.

, , and . GRID, page 58-65. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Mining-Based Ethereum Fraud Detection., , , and . Blockchain, page 266-273. IEEE, (2019)Interactive Website Filter for Safe Web Browsing., , and . J. Inf. Sci. Eng., 29 (1): 115-131 (2013)An efficient LKH tree balancing algorithm for group key management., , , and . IEEE Communications Letters, 10 (3): 222-224 (2006)Inclusive persuasion for security software adoption., and . SOUPS, USENIX Association, (2017)Obfuscated malicious javascript detection using classification techniques, , and . Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on, page 47 -54. (October 2009)Recovery of 3-D Shape using Hybrid Reflectance Model., , and . ICIP (2), page 120-124. IEEE Computer Society, (1994)On the fast shape recovery technique using multiple ring lights., , and . Pattern Recognit., 30 (6): 883-893 (1997)Stabilizing Certificate Dispersal., and . J. Aerosp. Comput. Inf. Commun., 3 (10): 487-497 (2006)B-APT: Bayesian Anti-Phishing Toolbar., , , , and . ICC, page 1745-1749. IEEE, (2008)Changing young women's perceptions of CS via outreach., and . ITiCSE, page 333. ACM, (2013)