Author of the publication

Evaluation of Network Risk Using Attack Graph Based Security Metrics.

, , , and . DASC/PiCom/DataCom/CyberSciTech, page 91-93. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Scale Based Approach for Denoising Real-World Noisy Image Using Curvelet Thresholding: Scope and Beyond., , , , , and . IEEE Access, (2024)Global incidence, prevalence, years lived with disability (YLDs), disability-adjusted life-years (DALYs), and healthy life expectancy (HALE) for 371 diseases and injuries in 204 countries and territories and 811 subnational locations, 1990–2021: a systematic analysis for the Global Burden of Disease Study 2021, , , , , , , , , and 1318 other author(s). (2024)Erratum.. Operations Research, 16 (1): 222 (1968)Introduction to Part II: Sensors to mHealth Markers., , and . Mobile Health - Sensors, Analytic Methods, and Applications, Springer, (2017)Introduction to Part I: mHealth Applications and Tools., , and . Mobile Health - Sensors, Analytic Methods, and Applications, Springer, (2017)Designing localized algorithms for barrier coverage., , and . MobiCom, page 63-74. ACM, (2007)A View Recommendation Greedy Algorithm for Materialized Views Selection., , and . ICISTM, volume 141 of Communications in Computer and Information Science, page 61-70. Springer, (2011)Ensuring Predictable Contact Opportunity for Scalable Vehicular Internet Access On the Go., , , and . CoRR, (2014)Barrier coverage with wireless sensors., , and . MobiCom, page 284-298. ACM, (2005)Queueing Theory., and . Wiley Encyclopedia of Computer Science and Engineering, John Wiley & Sons, Inc., (2008)