Author of the publication

Information security risks management framework - A step towards mitigating security risks in university network.

, and . J. Inf. Secur. Appl., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information security risks management framework - A step towards mitigating security risks in university network., and . J. Inf. Secur. Appl., (2017)A framework for zero-day vulnerabilities detection and prioritization., , and . J. Inf. Secur. Appl., (2019)A model for quantitative security measurement and prioritisation of vulnerability mitigation., and . Int. J. Secur. Networks, 8 (3): 139-153 (2013)Implementing New-age Authentication Techniques using OpenID for Security Automation, , , and . CoRR, (2010)Designing secure email infrastructure., , , and . WOCN, page 1-9. IEEE, (2012)Query Processing and Optimization of Parallel Database System in Multi Processor Environments., , , and . Asia International Conference on Modelling and Simulation, page 191-194. IEEE Computer Society, (2012)Design And Implementation of Two Axis Sun Follower PV System., , , , , and . IC3I, page 2046-2050. IEEE, (2023)Scalable Approach Towards Discovery of Unknown Vulnerabilities., and . Int. J. Netw. Secur., 20 (5): 827-835 (2018)Information Security Risk Management Framework for University Computing Environment., and . Int. J. Netw. Secur., 19 (5): 742-751 (2017)Application of quantitative security measurement model for prioritisation of vulnerability mitigation: a real case study., and . Int. J. Inf. Comput. Secur., 8 (4): 309-329 (2016)