Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing Reusable Web-Applications by Employing Enterprise Frameworks., , , and . ISCIS, volume 2869 of Lecture Notes in Computer Science, page 1051-1059. Springer, (2003)AFOPT Algorithm for Multi-Level Databases., , , , and . SYNASC, page 129-133. IEEE Computer Society, (2005)On the security verification of a short message service protocol., , , , and . WCNC, page 1-6. IEEE, (2018)Performance of OnPrem Versus Azure SQL Server: A Case Study., , , and . IEEE Access, (2019)New method of detection and wiping of sensitive information., , , , and . ICCP, page 145-148. IEEE, (2011)On Establishing and Fixing a Parallel Session Attack in a Security Protocol., , , and . IDC, volume 162 of Studies in Computational Intelligence, page 239-244. Springer, (2008)A Comparative Study of MongoDB and Document-Based MySQL for Big Data Application Data Management., , , and . Big Data Cogn. Comput., 6 (2): 49 (2022)Adaptive AFOPT Algorithm., , , , and . SYNASC, page 134-138. IEEE Computer Society, (2005)Automated internal web page clustering for improved data extraction., , , and . WIMS, page 66:1-66:4. ACM, (2012)Full-Text Search Engine using MySQL., , , and . Int. J. Comput. Commun. Control, 5 (5): 735-743 (2010)