Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CSRS: A Context and Sequence Aware Recommendation System., , , , and . FIRE, page 8-15. ACM, (2016)Design of a Forensic Enabled Secure Cloud Logging., , and . ICDCN, page 61:1. ACM, (2020)Fuzzy Logic Approach for Impact Source Identification in Ceramic Plates., , , , , , and . IC-AI, page 932-937. CSREA Press, (2009)Software Complexity for Computer Communication and Sensor Networks Using Binary Decision Diagrams., , , , and . Software Engineering Research and Practice, page 451-456. CSREA Press, (2008)FPGA Implementation of Fuzzy Reliability of Unmanned Vehicles., and . IC-AI, page 189-195. CSREA Press, (2009)Fuzzy And Neurofuzzy Techniques For Crack Detection In Armor Plates., , , , , and . MSV, page 298-307. CSREA Press, (2008)BlockSLaaS: Blockchain Assisted Secure Logging-as-a-Service for Cloud Forensics., and . ISEA-ISAP, volume 939 of Communications in Computer and Information Science, page 77-88. Springer, (2018)What's Next? A Recommendation System for Industrial Training., , , and . Data Sci. Eng., 3 (3): 232-247 (2018)A Secure Software Engineering Perspective, and . (2013)Framework to Secure Browser Using Configuration Analysis., , and . Int. J. Inf. Secur. Priv., 11 (2): 49-63 (2017)