Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating 'State of the Network' information into impairment model using binary logic operators., and . ICNC, page 1-5. IEEE Computer Society, (2016)Impairment Aware Routing and Wavelength Assignment model employing binary logic operators., and . ONDM, page 1-6. IEEE, (2016)Routing multiple services in Optical Transport Network environment using mixed line rates., , and . ICACCI, page 44-49. IEEE, (2014)Cyber forensics framework for big data analytics in IoT environment using machine learning., , and . Multim. Tools Appl., 79 (23-24): 15881-15900 (2020)Using Natural Language Processing and Graph Mining to Explore Inter- Related Requirements in Software Artefacts.. ACM SIGSOFT Softw. Eng. Notes, 44 (1): 37 (2019)Data mining-based integrated network traffic visualization framework for threat detection., and . Neural Comput. Appl., 26 (1): 117-130 (2015)Fuzzy reliability analysis of integrated network traffic visualization system., , and . J. Intell. Fuzzy Syst., 31 (3): 1941-1953 (2016)TI-16 DNS Labeled Dataset for Detecting Botnets., , and . IEEE Access, (2023)Performance Analysis of Target Information Recognition System for Agricultural Robots., , , and . Int. J. Agric. Environ. Inf. Syst., 12 (2): 49-60 (2021)SASM- An Approach towards Self-protection in Grid Computing., and . ICISTM, volume 141 of Communications in Computer and Information Science, page 149-159. Springer, (2011)