Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

File Replication and Dereplication of Replica's in Distributed Environment., , and . IC3, volume 306 of Communications in Computer and Information Science, page 358-369. Springer, (2012)Authentication and Authorization Interface Using Security Service Level Agreements for Accessing Cloud Services., , and . IC3, volume 306 of Communications in Computer and Information Science, page 370-382. Springer, (2012)BLADE: Robust malware detection against obfuscation in android., , and . Digit. Investig., (2021)Neighbour teaching learning based optimization for global optimization problems., , and . J. Intell. Fuzzy Syst., 34 (3): 1583-1594 (2018)An effect of chaos grasshopper optimization algorithm for protection of network infrastructure., , and . Comput. Networks, (2020)Active learning approach using a modified least confidence sampling strategy for named entity recognition., , and . Prog. Artif. Intell., 10 (2): 113-128 (2021)An Assistive Tool For Fileless Malware Detection., , , , and . WAC, page 21-25. IEEE, (2021)On the Fly File Dereplication Mechanism., , , , and . ACITY (1), volume 176 of Advances in Intelligent Systems and Computing, page 709-718. Springer, (2012)Distributed Ledger Technology based Property Transaction System with Support for IoT Devices., and . Int. J. Cloud Appl. Comput., 9 (2): 60-78 (2019)Blockchain-based e-cheque clearing framework with trust based consensus mechanism., , and . Clust. Comput., 24 (2): 851-865 (2021)