Author of the publication

Automated Framework for Scalable Collection and Intelligent Analytics of Hacker IRC Information.

, , and . ICCAC, page 33-39. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Just In Time Architecture (JITA) for dynamically composable data centers., , , , , and . AICCSA, page 1-8. IEEE Computer Society, (2016)Value of Service Based Task Scheduling for Cloud Computing Systems., , , , , and . ICCAC, page 1-11. IEEE Computer Society, (2016)Quasi-cliques Analysis for IRC Channel Thread Detection., , , , and . COMPLEX NETWORKS (1), volume 812 of Studies in Computational Intelligence, page 578-589. Springer, (2018)Toward Resilience Methods in Cloud Computing., and . AICCSA, page 1-2. IEEE, (2021)Design and evaluation of resilient infrastructures systems for smart cities., , and . ISC2, page 1-6. IEEE, (2016)Secure and Resilient Cloud Services for Enhanced Living Environments., , , and . IEEE Cloud Computing, 3 (6): 44-52 (2016)RoCoCo: Row and Column Compression for high-performance multiplication on FPGAs., , , , , and . EWDTS, page 98-101. IEEE Computer Society, (2011)Multi-Layer Mapping of Cyberspace for Intrusion Detection., , , , , , and . AICCSA, page 1-8. IEEE, (2021)Autonomic Author Identification in Internet Relay Chat (IRC)., , , and . AICCSA, page 1-8. IEEE Computer Society, (2018)Autonomic performance-per-watt management (APM) of cloud resources and services., , , and . CAC, page 2:1-2:10. ACM, (2013)