关注
Jnanamurthy H K
Jnanamurthy H K
Postdoctoral fellow
在 mail.huji.ac.il 的电子邮件经过验证
标题
引用次数
引用次数
年份
Detection and filtering of collaborative malicious users in reputation system using quality repository approach
HK Jnanamurthy, S Singh
2013 International Conference on Advances in Computing, Communications and …, 2013
202013
Discovery of maximal frequent item sets using subset creation
HK Jnanamurthy, HV Vishesh, V Jain, P Kumar, RM Pai
International Journal of Data Mining & Knowledge Management Process 3 (1), 27, 2013
162013
Modelling and verification of extensible authentication protocol using spin model checker
MS Hegde, HK Jnanamurthy, S Singh
International Journal of Network Security & Its Applications 4 (6), 81, 2012
112012
Threat analysis and malicious user detection in reputation systems using mean bisector analysis and cosine similarity (MBACS)
HK Jnanamurthy, C Warty, S Singh
2013 Annual IEEE India Conference (INDICON), 1-6, 2013
102013
Analysis of Industrial Control System Software to Detect Semantic Clones
HK Jnanamurthy, R Jetley, F Henskens, D Paul, M Wallis, SD Sudarsan
7*
Clone detection in model-based development using formal methods to enhance performance in software development
H Jnanamurthy, F Henskens, D Paul, M Wallis
2018 3rd International Conference for Convergence in Technology (I2CT), 1-8, 2018
52018
Verification of interactive automated air traffic control system in a model driven approach
HK Jnanamurthy, F Henskens, D Paul
2016 2nd International Conference on Contemporary Computing and Informatics …, 2016
42016
Formal verification of the Extensible Authentication Protocol using SPIN
MS Hegde, HK Jnanamurthy, S Singh
Proceedings of the Second International Conference on Computational Science …, 2012
42012
Top Down Approach to find Maximal Frequent Item Sets using Subset Creation
H Jnanamurthy, HV Vishesh, PK Vishruth Jain, RM Pai
Comput. Sci. Inf. Technol.(CS IT), 445-452, 2012
22012
Formal specification at model-level of model-driven engineering using modelling techniques
HK Jnanamurthy, F Henskens, D Paul, M Wallis
International Journal of Computer Applications in Technology 67 (4), 340-350, 2021
12021
Multi-level analysis of IEC 61131-3 languages to detect clones
HK Jnanamurthy, R Jetley, F Henskens, D Paul, M Wallis, SD Sudarsan
International Journal of Computer Applications in Technology 63 (4), 286-299, 2020
12020
Formal Modelling and Verification of Software Defined Network
V Varadharajan
arXiv preprint arXiv:2004.04425, 2020
2020
Formal Modelling and Verification of Software Defined Network.
HK Jnanamurthy, V Varadharajan
CoRR, 2020
2020
Formal Modelling and Analysis of Software Defined Networks
HK Jnanamurthy, V Varadharajan
2019
Model-driven engineering to enhance the reliability of software development by verifying system properties and detecting clones
J Hogavanaghatta Kumaraswamy
University of Newcastle, 2019
2019
Analysis of industrial control system software to detect semantic clones
J HK, R Jetley, F Henskens, D Paul, M Wallis, S SD
Institute of Electrical and Electronics Engineers (IEEE), 2019
2019
Clone detection in model-based development using formal methods to enhance performance in software development
J Hogavanaghatta Kumaraswamy, F Henskens, D Paul, M Wallis
Institute of Electrical and Electronics Engineers (IEEE), 2018
2018
Top Down Approach to find Maximal Frequent Item Sets using Subset Creation
V Jain, P Kumar, RM Pai
arXiv preprint arXiv:1210.8229, 2012
2012
系统目前无法执行此操作,请稍后再试。
文章 1–18