Author of the publication

Security Analysis of Container Images Using Cloud Analytics Framework.

, , , , and . ICWS, volume 10966 of Lecture Notes in Computer Science, page 116-133. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated detection and verification of parity-protected memory elements., , , and . ICCAD, page 1-8. IEEE, (2014)Measurements for structural logic synthesis optimizations., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 22 (6): 665-674 (2003)Stable Adaptive Schemes for System Identification and Control - Part II., and . IEEE Trans. Syst. Man Cybern., 4 (6): 552-560 (1974)Implicit enumeration of structural changes in circuit optimization., and . DAC, page 438-441. ACM, (2004)Learning Without Forgetting: A New Framework for Network Cyber Security Threat Detection., , and . IEEE Access, (2021)Testing two-phase transition signaling based self-timed circuits in a synthesis environment., and . HLSS, page 104-111. ACM, (1994)Statistical Fault Injection., , , , and . DSN, page 122-127. IEEE Computer Society, (2008)A Technique for Synthesizing Distributed Burst-mode Circuits., , and . DAC, page 67-70. ACM Press, (1996)Stable Adaptive Schemes for System Identification and Control-Part I., and . IEEE Trans. Syst. Man Cybern., 4 (6): 542-551 (1974)Dynamic Autoselection and Autotuning of Machine Learning Models for Cloud Network Analytics., , and . IEEE Trans. Parallel Distributed Syst., 30 (5): 1052-1064 (2019)