Author of the publication

Minimum-sized Positive Influential Node Set selection for social networks: Considering both positive and negative influences.

, , , , and . IPCCC, page 1-8. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Request and Response Analysis Framework for Mitigating Clickjacking Attacks., , and . Int. J. Secur. Softw. Eng., 6 (3): 1-25 (2015)A Statistical Summary Analysis of Window-Based Extracted Features for EEG Signal Classification., , , and . ICDH, page 293-298. IEEE, (2021)A Methodological Tool for Asset Identification in Web Applications: Security Risk Assessment., , and . ICSEA, page 413-418. IEEE Computer Society, (2009)Mitigating distributed denial of service attacks at the application layer., , and . SAC, page 693-696. ACM, (2017)Actionable Knowledge Extraction Framework for COVID-19., , , , , , and . IEEE BigData, page 4036-4041. IEEE, (2020)r-LSTM: Time Series Forecasting for COVID-19 Confirmed Cases with LSTMbased Framework., , , and . IEEE BigData, page 1374-1379. IEEE, (2020)Information Theoretic Anomaly Detection Framework for Web Application., , and . COMPSAC Workshops, page 394-399. IEEE Computer Society, (2016)978-1-4673-8845-0.OCL Fault Injection-Based Detection of LDAP Query Injection Vulnerabilities., , and . COMPSAC Workshops, page 455-460. IEEE Computer Society, (2016)978-1-4673-8845-0.Classification of Lightweight Directory Access Protocol query injection attacks and mitigation techniques., , and . CTS, page 337-344. IEEE, (2015)Rule-Based Source Level Patching of Buffer Overflow Vulnerabilities., and . ITNG, page 627-632. IEEE Computer Society, (2013)