Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fingerprint Enhancement and Reconstruction., and . ICIC (2), volume 5755 of Lecture Notes in Computer Science, page 660-669. Springer, (2009)Handling Insider Threat Through Supervised Machine Learning Techniques., , , and . EUSPN/ICTH, volume 177 of Procedia Computer Science, page 64-71. Elsevier, (2020)An Optimal Dynamic Threat Evaluation and Weapon Scheduling Technique., and . SGAI Conf., page 437-450. Springer, (2009)Security, Safety and Trust Management (SSTM '17)., , , , and . WETICE, page 242-243. IEEE Computer Society, (2017)Role of Corner Detection in Capturing Shape Outlines., and . JCIS, Atlantis Press, (2006)Capturing outlines of 2D objects with Bézier cubic approximation., and . Image Vis. Comput., 27 (6): 704-712 (2009)Textual analysis of traitor-based dataset through semi supervised machine learning., , , , and . Future Gener. Comput. Syst., (2021)Development of A Robust Privacy Enhancing Data-Sharing Framework for Healthcare System Based on Decentralized Control., , , and . ANZCC, page 224-229. IEEE, (2022)Diving Deep With BotLab-DS1: A Novel Ground Truth-Empowered Botnet Dataset., , , , , and . IEEE Access, (2024)Growing B-spline Model for Efficient Approximation of Complex Curves., and . IV, page 507-512. IEEE Computer Society, (2011)