Author of the publication

Transformative Computing in Knowledge Extraction and Service Management Processes.

, , and . EIDWT, volume 47 of Lecture Notes on Data Engineering and Communications Technologies, page 222-225. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cognitive cryptography for data security in cloud computing.. Concurr. Comput. Pract. Exp., (2020)Strategic Information Splitting Using Biometric Patterns., , and . J. Internet Serv. Inf. Secur., 2 (3/4): 129-133 (2012)Transformative Computing in Knowledge Extraction and Service Management Processes., , and . EIDWT, volume 47 of Lecture Notes on Data Engineering and Communications Technologies, page 222-225. Springer, (2020)Grammar Encoding in DNA-Like Secret Sharing Infrastructure., and . AST/UCMA/ISA/ACN, volume 6059 of Lecture Notes in Computer Science, page 175-182. Springer, (2010)Biometric-Based Linguistic Solutions for Data Encryption and Sharing., , and . AINA, volume 926 of Advances in Intelligent Systems and Computing, page 181-187. Springer, (2019)Context-Aware Approaches in Cognitive Cloud and Cybersecurity., , and . NBiS, volume 183 of Lecture Notes on Data Engineering and Communications Technologies, page 180-185. Springer, (2023)Transformative Computing Based on Advanced Human Cognitive Processes., , and . INCoS, volume 312 of Lecture Notes in Networks and Systems, page 112-115. Springer, (2021)Predictive Intelligence Approaches for Security Technologies., and . BWCCA, volume 346 of Lecture Notes in Networks and Systems, page 193-196. Springer, (2021)Transformative Intelligence in Data Analysis and Knowledge Exploration., , and . AINA (2), volume 200 of Lecture Notes on Data Engineering and Communications Technologies, page 274-281. Springer, (2024)Cognitive information systems in secure information management and personalized cryptography., , and . SCIS&ISIS, page 1152-1157. IEEE, (2014)