7 results on '"Jalili S"'
Search Results
2. Alert Correlation Using Correlation Probability Estimation and Time Windows.
3. Selecting Proper Security Patterns Using Text Classification.
4. Using supervised and transductive learning techniques to extract network attack scenarios.
5. Monitoring safety properties of composite web services at runtime using CSP.
6. RVERL: Run-time Verification of Real-time and Reactive Programs using Event-based Real-Time Logic Approach.
7. AECM: an aspect enabled component model.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.