From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Formalizing an abstract architecture for the alternative data source utilized during system availability under intrusion threat., , , и . ICWCA, стр. 1-6. IEEE, (2012)Graphical authentication based on anti-shoulder surfing mechanism., , , и . ICFNDS, стр. 20:1-20:6. ACM, (2018)Sentiment Analysis of Reviews in Natural Language: Roman Urdu as a Case Study., , , , , , и . IEEE Access, (2022)Adaptive security architectural model for protecting identity federation in service oriented computing., , , и . J. King Saud Univ. Comput. Inf. Sci., 33 (5): 580-592 (2021)A User-Priorities-Based Strategy for Three-Phase Intelligent Recommendation and Negotiating Agents for Cloud Services., , , , , , и . IEEE Access, (2023)A O(E) Time Shortest Path Algorithm For Non Negative Weighted Undirected Graphs, , , и . CoRR, (2009)Mechanism to continue system availability during cyber threat scenario., , , , , и . IMCOM, стр. 92. ACM, (2017)Biologically Inspired Execution Framework for Vulnerable Workflow Systems, , , и . CoRR, (2009)An edge-wise linear shortest path algorithm for non negative weighted undirected graphs., , , , и . FIT, стр. 67:1-67:4. ACM, (2009)Analyzing Framework for Alternate Execution of Workflows for Different Types of Intrusion Threats., и . ICSECS (2), том 180 из Communications in Computer and Information Science, стр. 361-375. Springer, (2011)