Author of the publication

Formalizing an abstract architecture for the alternative data source utilized during system availability under intrusion threat.

, , , and . ICWCA, page 1-6. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graphical authentication based on anti-shoulder surfing mechanism., , , and . ICFNDS, page 20:1-20:6. ACM, (2018)Sentiment Analysis of Reviews in Natural Language: Roman Urdu as a Case Study., , , , , , and . IEEE Access, (2022)Optimization of predictive performance of intrusion detection system using hybrid ensemble model for secure systems., , , , and . PeerJ Comput. Sci., (2023)A Review of Prominent Work on Agile Processes Software Process Improvement and Process Tailoring Practices., , and . ICSECS (3), volume 181 of Communications in Computer and Information Science, page 571-585. Springer, (2011)Automatic Sentiment Annotation of Idiomatic Expressions for Sentiment Analysis Task., , and . IEEE Access, (2022)A meta-model of software development project states behavioral study of software projects., , and . J. Softw. Evol. Process., (2017)A O(E) Time Shortest Path Algorithm For Non Negative Weighted Undirected Graphs, , , and . CoRR, (2009)Mechanism to continue system availability during cyber threat scenario., , , , , and . IMCOM, page 92. ACM, (2017)Biologically Inspired Execution Framework for Vulnerable Workflow Systems, , , and . CoRR, (2009)Improving latency in Internet-of-Things and cloud computing for real-time data transmission: a systematic literature review (SLR)., , , , , and . Clust. Comput., 26 (5): 2657-2680 (October 2023)