Author of the publication

Fuzzy cognitive map-based reasoning for prediction of multi-stage attacks in risk assessment.

, , and . IJIEI, 4 (2): 151-167 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Encryption of Intra and Inter Frames in MPEG Video., , and . CNSA, volume 89 of Communications in Computer and Information Science, page 93-104. Springer, (2010)Automatic segmentation of sub-acute ischemic stroke lesion by using DTCWT and DBN with parameter fine tuning., and . Evol. Intell., 12 (3): 479-490 (2019)Increased level of security using DNA steganography., , and . Int. J. Adv. Intell. Paradigms, 10 (1/2): 74-82 (2018)Game chromatic number of lexicographic product graphs., and . AKCE Int. J. Graphs Comb., 12 (Issues): 216-220 (2015)An Improved Level of Security for DNA Steganography Using Hyperelliptic Curve Cryptography., , and . Wireless Personal Communications, 89 (4): 1221-1242 (2016)Reinforcement learning-based multi-objective energy-efficient task scheduling in fog-cloud industrial IoT-based systems., and . Soft Comput., 27 (23): 17473-17491 (December 2023)Multiplicity of triangles in cocktail party graphs.. Discret. Math., 206 (1-3): 217-218 (1999)Soil salinity prediction based on hybrid classifier: study on Bellary and Chamarajanagar district in Karnataka., , , and . Multim. Tools Appl., 83 (16): 47225-47246 (May 2024)Risk aware intelligent system for insider threat detection., , and . IJDATS, 9 (4): 362-379 (2017)USCDRP: unequal secure cluster-based distributed routing protocol for wireless sensor networks., and . J. Supercomput., 76 (2): 989-1004 (2020)