Author of the publication

MVE-based Reinforcement Learning Framework with Explainability for improving Quality of Experience of Application Placement in Fog Computing.

, , and . AIIoT, page 84-90. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CoRuM: Collaborative Runtime Monitor Framework for Application Security., and . UCC Companion, page 201-206. IEEE, (2018)IoMT-SAF: Internet of Medical Things Security Assessment Framework., , , and . Internet Things, (2019)Runtime monitors for tautology based SQL injection attacks., and . CyberSec, page 253-258. IEEE, (2012)Comparing Agent Software Development Methodologies using the CMMI Engineering Process Model., and . AMCIS, page 510. Association for Information Systems, (2005)A file integrity checking system to detect and recover from program modification attacks in multi-user computer systems., and . Comput. Secur., 9 (5): 431-446 (1990)Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection., , , , , , and . IEEE Trans. Netw. Serv. Manag., 19 (4): 4821-4833 (December 2022)Energy Efficient Double Critic Deep Deterministic Policy Gradient Framework for Fog Computing., and . AIIoT, page 521-527. IEEE, (2022)On a Generic Security Game Model., and . CoRR, (2018)Combinational logic synthesis from an HDL description.. DAC, page 550-555. ACM/IEEE, (1980)Requirements Elicitation and Stakeholder Communications for Explainable Machine Learning Systems: State of the Art., , and . ICIT, page 561-566. IEEE, (2023)