Author of the publication

Formalizing an abstract architecture for the alternative data source utilized during system availability under intrusion threat.

, , , and . ICWCA, page 1-6. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formalizing an abstract architecture for the alternative data source utilized during system availability under intrusion threat., , , and . ICWCA, page 1-6. IEEE, (2012)A User-Priorities-Based Strategy for Three-Phase Intelligent Recommendation and Negotiating Agents for Cloud Services., , , , , , and . IEEE Access, (2023)Sentiment Analysis of Reviews in Natural Language: Roman Urdu as a Case Study., , , , , , and . IEEE Access, (2022)Graphical authentication based on anti-shoulder surfing mechanism., , , and . ICFNDS, page 20:1-20:6. ACM, (2018)Adaptive security architectural model for protecting identity federation in service oriented computing., , , and . J. King Saud Univ. Comput. Inf. Sci., 33 (5): 580-592 (2021)A O(E) Time Shortest Path Algorithm For Non Negative Weighted Undirected Graphs, , , and . CoRR, (2009)Mechanism to continue system availability during cyber threat scenario., , , , , and . IMCOM, page 92. ACM, (2017)Biologically Inspired Execution Framework for Vulnerable Workflow Systems, , , and . CoRR, (2009)An edge-wise linear shortest path algorithm for non negative weighted undirected graphs., , , , and . FIT, page 67:1-67:4. ACM, (2009)Analyzing Framework for Alternate Execution of Workflows for Different Types of Intrusion Threats., and . ICSECS (2), volume 180 of Communications in Computer and Information Science, page 361-375. Springer, (2011)