Author of the publication

State Machine-Based Security Fusion for Resource-Constrained Environments.

, , and . IEEE Syst. J., 7 (3): 430-441 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predictive Cyber-security Analytics Framework: A non-homogenous Markov model for Security Quantification., and . CoRR, (2015)Proteome-scale Deployment of Protein Structure Prediction Workflows on the Summit Supercomputer., , , , , , and . IPDPS Workshops, page 206-215. IEEE, (2022)Exploitability analysis using predictive cybersecurity framework., and . CYBCONF, page 317-323. IEEE, (2015)On the Use of Containers in High Performance Computing Environments., , , and . CLOUD, page 284-293. IEEE, (2020)Security architecture for resource-limited environments., , and . IWCMC, page 412-417. IEEE, (2011)A Novel Architecture for Predictive CyberSecurity Using Non-homogenous Markov Models., and . TrustCom/BigDataSE/ISPA (1), page 774-781. IEEE, (2015)State Machine-Based Security Fusion for Resource-Constrained Environments., , and . IEEE Syst. J., 7 (3): 430-441 (2013)High-Performance Deep Learning Toolbox for Genome-Scale Prediction of Protein Structure and Function., , , , , , , , , and 7 other author(s). MLHPC@SC, page 46-57. IEEE, (2021)Enhancing Web Services Availability., , and . ICEBE, page 352-355. IEEE Computer Society, (2005)Fair BPEL Processes Transaction using Non-Repudiation Protocols., , , and . IEEE SCC, page 337-342. IEEE Computer Society, (2005)