G. Zayaraz

Affiliations:
  • Pondicherry Engineering College, Department of Computer Science and Engineering, India


According to our database1, G. Zayaraz authored at least 22 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A rendezvous block-based authentication framework for service-level security in decentralized cloud resources.
Expert Syst. J. Knowl. Eng., May, 2023

BSPC: blockchain-aided secure process control for improving the efficiency of industrial Internet of Things.
J. Ambient Intell. Humaniz. Comput., 2023

Handwritten Digit Recognition Using CNN with Average Pooling and Global Average Pooling.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023

2021
A Robust Lightweight Data Security Model for Cloud Data Access and Storage.
Int. J. Inf. Technol. Web Eng., 2021

Technical debt reduction using epsilon-Nash equilibrium for the perturbed software refactor game model.
Int. J. Inf. Decis. Sci., 2021

2020
A Game Theoretic Approach for Quality Assurance in Software Systems Using Antifragility-Based Learning Hooks.
J. Cases Inf. Technol., 2020

A Tweakable Key Alternating Lightweight Cipher for Internet of Things.
Int. J. Inf. Secur. Priv., 2020

2019
A Hybrid Tabu Genetic Metaheuristic for Selection of Security Controls.
Int. J. Appl. Metaheuristic Comput., 2019

2017
A Bayesian approach and probabilistic latent variable clustering based web services selection.
Int. J. Knowl. Eng. Soft Data Paradigms, 2017

Risk aware intelligent system for insider threat detection.
Int. J. Data Anal. Tech. Strateg., 2017

Development and statistical validation of an ontology-based question answering system.
Int. J. Comput. Aided Eng. Technol., 2017

2016
An Improved Level of Security for DNA Steganography Using Hyperelliptic Curve Cryptography.
Wirel. Pers. Commun., 2016

Rank propagated secured path selection technique for mobile ad hoc networks.
Int. J. Knowl. Eng. Soft Data Paradigms, 2016

Fuzzy cognitive map-based reasoning for prediction of multi-stage attacks in risk assessment.
Int. J. Intell. Eng. Informatics, 2016

Requirements driven test prioritisation approach for web service composition.
Int. J. Comput. Appl. Technol., 2016

Combined architectural framework for the selection of architectures using ATAM, FAHP and CBAM.
Int. J. Comput. Appl. Technol., 2016

2015
Concept relation extraction using Naïve Bayes classifier for ontology-based question answering systems.
J. King Saud Univ. Comput. Inf. Sci., 2015

Hybrid secure GSM architecture using DNA computing-based hyperelliptic curve cryptography.
Int. J. Electron. Secur. Digit. Forensics, 2015

Automatic relation extraction using naïve Bayes classifier for concept relational ontology development.
Int. J. Comput. Aided Eng. Technol., 2015

2010
Implementation of Pseudo-Random Route-Driven ECDH Scheme for Heterogeneous Sensor Networks.
Int. J. Commun. Networks Inf. Secur., 2010

2005
Software quality assurance through COSMIC FFP.
ACM SIGSOFT Softw. Eng. Notes, 2005

2003
New approach to software architecture.
ACM SIGSOFT Softw. Eng. Notes, 2003


  Loading...