Search

Your search keyword '"Ankur Shukla"' showing total 49 results

Search Constraints

Start Over You searched for: Author "Ankur Shukla" Remove constraint Author: "Ankur Shukla"
49 results on '"Ankur Shukla"'

Search Results

1. Developing Security Assurance Metrics to Support Quantitative Security Assurance Evaluation

2. Automatic Verification and Execution of Cyber Attack on IoT Devices

3. Exploring Values and Beliefs in a Complex Coastal Social-Ecological System: A Case of Small-Scale Fishery and Dried Fish Production in Sagar Island, Indian Sundarbans

12. Automatic Verification and Execution of Cyber Attack on IoT Devices

17. Do Women Directors Impact the Risk and Return of Indian Banks?

18. Influence of independent directors on the market risks of Indian banks

19. Impact of board size on the accounting returns and the asset quality of Indian banks

22. Impact of deviation from target working capital on firm profitability: evidence from India

23. Diagnosis of Diabetes Using Convolutional Neural Network

24. Computer Security. ESORICS 2023 International Workshops : CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II

25. System security assurance: A systematic literature review

26. Computer Security. ESORICS 2022 International Workshops : CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers

27. NHPP-Based Software Reliability Growth Modeling and Optimal Release Policy for N-Version Programming System with Increasing Fault Detection Rate under Imperfect Debugging

28. Vulnerability Discovery Modelling With Vulnerability Severity

29. Modeling and analysis of software fault detectability and removability with time variant fault exposure ratio, fault removal efficiency, and change point

30. Do Board Characteristics Impact the Market Performance of Indian Banks?

32. Change Point Problem in Security Vulnerability Discovery Model

33. The Detection of Prameha (Diabetes) in Ayurvedic Way with the Help of Fuzzy Deep Learning

34. Systemic vasoprotection by inhaled carbon monoxide is mediated through prolonged alterations in monocyte/macrophage function

35. Modeling and Analysis of Software Fault Detection and Correction Process Through Weibull-Type Fault Reduction Factor, Change Point and Imperfect Debugging

36. P2Y 2 nucleotide receptor mediates arteriogenesis in a murine model of hind limb ischemia

37. Effect of Test Coverage and Change Point on Software Reliability Growth Based on Time Variable Fault Detection Probability

38. Estimation of software reliability and development cost using interval type-2 fuzzy AHP

39. Xanthine Oxidoreductase Function Contributes to Normal Wound Healing

40. Permission recommender system for Android

41. Optimal Release Time Determination Using FMOCCP Involving Randomized Cost Budget for FSDE-Based Software Reliability Growth Model

42. A unified approach of testing coverage‐based software reliability growth modelling with fault detection probability, imperfect debugging, and change point

43. Modeling and analysis of reliability and optimal release policy of software with testing domain coverage efficiency

44. Analysis of secure watermarking based on DWT-SVD technique for piracy

45. Software reliability modeling with different type of faults incorporating both imperfect debugging and change point

46. An Ideal Software Release Policy for an Improved Software Reliability Growth Model Incorporating Imperfect Debugging with Fault Removal Efficiency and Change Point

47. Implementation of Distributed Searching and Sorting using Hadoop MapReduce

48. TNF-alpha and the early vein graft-impact of soluble TNF-alpha receptor binding protein

49. Tumor necrosis factor-α and the early vein graft

Catalog

Books, media, physical & digital resources