Author of the publication

Design of Online Runtime and Testing Environment for Instant Java Programming Assessment.

, , and . ITNG, page 1102-1106. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hybrid approach for mobile security threat analysis., , , , , and . WISEC, page 28:1-28:2. ACM, (2015)Enhancing the information assurance and security (IAS) in CS education with mobile-device based hands-on labs., , , , and . ITiCSE, page 343. ACM, (2014)Mobile device based authentic learning for computer network and security., , , , and . ITiCSE, page 335. ACM, (2013)Security Data Mining in an Ontology for Vulnerability Management., and . IJCBS, page 597-603. IEEE Computer Society, (2009)Design of Online Runtime and Testing Environment for Instant Java Programming Assessment., , and . ITNG, page 1102-1106. IEEE Computer Society, (2010)Web Service-Enabled Spam Filtering with Naïve Bayes Classification., , , , , and . BigDataService, page 99-104. IEEE Computer Society, (2015)Enhancing Robustness of Neural Networks through Fourier Stabilization., , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 8880-8889. PMLR, (2021)An Incentive Compatible Mechanism for Replica Placement in Peer-Assisted Content Distribution., and . Int. J. Softw. Sci. Comput. Intell., 12 (1): 47-67 (2020)Vulnerability categorization using Bayesian networks., and . CSIIRW, page 29. ACM, (2010)Diverse virtual replicas for improving intrusion tolerance in cloud., and . CISR, page 41-44. ACM, (2014)