Author of the publication

A practical business security framework to combat malware threat.

, and . WorldCIS, page 77-80. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic program generation for heterogeneous architectures., , and . ICACCI, page 102-109. IEEE, (2016)XML wrapping attack mitigation using positional token., , , and . PKIA, page 36-42. IEEE, (2017)A Hybrid Recommender System Using Weighted Ensemble Similarity Metrics and Digital Filters., , , and . HiPC Workshops, page 32-38. IEEE Computer Society, (2016)Complementing static and dynamic analysis approaches for better network defense., and . DSN, page 1-2. IEEE Computer Society, (2013)The Role of Content Adaptation in Ubiquitous Learning., , and . T4E, page 177-182. IEEE Computer Society, (2011)Selection of test nodes for analog fault diagnosis in dictionary approach., and . IEEE Trans. Instrumentation and Measurement, 49 (6): 1289-1297 (2000)A Transparent End-to-End Security Solution., , , and . ICISS, volume 3803 of Lecture Notes in Computer Science, page 336-339. Springer, (2005)On minimal set of test nodes for fault dictionary of analog circuit fault diagnosis., and . J. Electron. Test., 7 (3): 255-258 (1995)Quality Analytics Framework for E-learning Application Environment., , , , , , and . T4E, page 204-207. IEEE Computer Society, (2012)Assistive Learning for Children with Autism Using Augmented Reality., , , and . T4E, page 43-46. IEEE Computer Society, (2013)