Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Watermarking technique for copyright protection of wireless sensor network data using LFSR and Kolmogorov complexity., , and . MoMM, page 208-217. ACM, (2012)Storage cost of spam 2.0 in a web discussion forum., , and . CEAS, page 200-209. ACM, (2011)Evaluation of spam detection and prevention frameworks for email and image spam: a state of art., and . iiWAS, page 520-527. ACM, (2008)Spam 2.0 State of the Art., and . Int. J. Digit. Crime Forensics, 4 (1): 17-36 (2012)A Study of the Parameters Impacting Sustainability in Information Technology Organizations., and . Int. J. Knowl. Based Organ., 7 (3): 27-39 (2017)Prosumer recruitment framework for prosumer community groups in smart-grid., , , and . Comput. Syst. Sci. Eng., (2015)HENRI: High Efficiency Negotiation-based Robust Interface for Multi-party Multi-issue Negotiation over the Internet., , , , , and . CoRR, (2022)Semi-automatic Information Extraction from Discussion Boards with Applications for Anti-Spam Technology., , , and . ICCSA (2), volume 6017 of Lecture Notes in Computer Science, page 370-382. Springer, (2010)Blockchain Technology for Supply Chain Traceability, Transparency and Data Provenance., , , and . ICBTA, page 22-26. ACM, (2018)ERCTP: End-to-End Reliable and Congestion Aware Transport Layer Protocol for Heterogeneous WSN., , and . Scalable Comput. Pract. Exp., (2010)