Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive multilevel fuzzy-based authentication framework to mitigate Cache side channel attack in cloud computing., , and . Int. J. Model. Simul. Sci. Comput., 9 (5): 1850045:1-1850045:21 (2018)Design and analysis of novel similarity measure for clustering and classification of high dimensional text documents., , and . CompSysTech, page 194-201. ACM, (2014)An approach for pattern oriented software development based on a design handbook., , , , , and . Ann. Softw. Eng., (2000)Assessing the Fault Proneness Degree (DFP) by Estimating the Impact of Change Request Artifacts Correlation., and . CoRR, (2015)A Generic Framework for Configuration Management of SPL and Controlling Evolution of Complex Software Products., and . ACM SIGSOFT Softw. Eng. Notes, 41 (1): 1-10 (2016)An optimal deep learning-based LSTM for stock price prediction using twitter sentiment analysis., , and . Appl. Intell., 52 (12): 13675-13688 (2022)Intrusion Detection Using an Ensemble of Decision Trees., , and . IICAI, page 382-392. IICAI, (2011)Dependency oriented complexity metrics to detect rippling related design defects., and . ACM SIGSOFT Softw. Eng. Notes, 34 (4): 1-7 (2009)Task Reprocessing on Real-Time Multicore Systems., , , and . ICIA, page 99:1-99:6. ACM, (2016)A Quantitative Evaluation of Software Quality Enhancement by Refactoring Using Dependency Oriented Complexity Metrics., and . ICETET, page 1011-1018. IEEE Computer Society, (2009)