Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conceptual Design of EPICS Based Implementation for ICRH DAC System., , , and . SocProS (2), volume 259 of Advances in Intelligent Systems and Computing, page 757-765. Springer, (2013)LabVIEW event handling using EPICS PV for ICRH DAC software., , , and . ICACCI, page 1177-1180. IEEE, (2016)Interfacing ICRH DAC system with WEB., , and . ICACCI, page 1170-1173. IEEE, (2015)An IP Traceback Model for Network Forensics., , and . ICDF2C, volume 53 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 129-136. Springer, (2010)UPB: User Preference based Brokering for Service Ranking and Selection in Federated Cloud., , , and . ANTS, page 1-6. IEEE, (2018)Network Forensic Analysis by Correlation of Attacks with Network Attributes., , and . ICT, volume 101 of Communications in Computer and Information Science, page 124-128. Springer, (2010)Parallel Misuse and Anomaly Detection Model., , and . Int. J. Netw. Secur., 14 (4): 211-222 (2012)Missing Value Imputation Based on K-Mean Clustering with Weighted Distance., , and . IC3 (1), volume 94 of Communications in Computer and Information Science, page 600-609. Springer, (2010)Unified Modeling Technique for Threat Cause Ranking, Mitigation and Testing., , and . IC3, volume 168 of Communications in Computer and Information Science, page 491-500. Springer, (2011)CLINIQA: A Machine Intelligence Based Clinical Question Answering System., , , and . CoRR, (2018)