Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multicast Scheduling for Switches with Multiple Input-Queues., and . Hot Interconnects, page 28-36. IEEE Computer Society, (2002)Investigation of pin-hole leaks in stainless steel water pipes., and . Int. J. Systems Assurance Engineering and Management, 6 (3): 342-349 (2015)Smart XSS Attack Surveillance System for OSN in Virtualized Intelligence Network of Nodes of Fog Computing., and . Int. J. Web Service Res., 14 (4): 1-32 (2017)Semi-Supervised Recurrent Neural Network for Adverse Drug Reaction Mention Extraction., , , , and . CoRR, (2017)Keystroke dynamics based authentication system with unrestricted data collection., , , and . IC3, page 1-6. IEEE Computer Society, (2017)Leveraging Machine Learning and SDN-Fog Infrastructure to Mitigate Flood Attacks., and . GLOBECOM (Workshops), page 1-6. IEEE, (2021)Lung-Originated Tumor Segmentation from Computed Tomography Scan (LOTUS) Benchmark., , , , , , , , , and 15 other author(s). CoRR, (2022)Real Time Collision Detection and Avoidance: A Case Study for Design Space Exploration in HW-SW Codesign., , , and . VLSI Design, page 97-. IEEE Computer Society, (1998)XSS-immune: a Google chrome extension-based XSS defensive framework for contemporary platforms of web applications., and . Security and Communication Networks, 9 (17): 3966-3986 (2016)Making Travel Smarter: Extracting Travel Information From Email Itineraries Using Named Entity Recognition., , , , and . RANLP, page 354-362. INCOMA Ltd., (2017)