Author of the publication

Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms.

, , , , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Investigation on Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset and Its Effectiveness., , and . CoRR, (2022)Leveraging Healthcare API to transform Interoperability: API Security and Privacy., , , , and . COMPSAC, page 444-445. IEEE, (2022)Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective., , , , , , , , and . TrustCom, page 959-967. IEEE, (2022)Blockchain-Based Decentralized Verifiable Credentials: Leveraging Smart Contracts for Privacy-Preserving Authentication Mechanisms to Enhance Data Security in Scientific Data Access., , and . IEEE Big Data, page 5493-5502. IEEE, (2023)Ransomware Classification and Detection With Machine Learning Algorithms., , , , , and . CCWC, page 316-322. IEEE, (2022)A Comparative Analysis Between SciTokens, Verifiable Credentials, and Smart Contracts: Novel Approaches for Authentication and Secure Access to Scientific Data., , and . PEARC, page 302-305. ACM, (2023)Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools., , , , , , , , and . COMPSAC, page 520-529. IEEE, (2022)Survey on Machine Learning Biases and Mitigation Techniques., , , , , and . Digit., 4 (1): 1-68 (March 2024)Smart Connected Aircraft: Towards Security, Privacy, and Ethical Hacking., , , , , , and . SIN, page 1-5. IEEE, (2021)Malware Detection and Prevention using Artificial Intelligence Techniques., , , , , , , , , and 1 other author(s). CoRR, (2022)