Showing
1 - 4
results of
4
Skip to content
VuFind
Log in
Library Catalogue Plus
Library
Subject guides
Databases
Referencing
Catalogue
Articles Plus
Keyword
Title
Author
Subject
Find
Advanced Search
Search Results - Eeralla, Ajay Kumar
Search Results - Eeralla, Ajay Kumar
Showing
1 - 4
results of
4
Refine Results
Sort
Relevance
Date Descending
Author
Title
1
Loading…
Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability
by
Bana, Gergei
,
Chadha, Rohit
,
Eeralla, Ajay Kumar
,
Okada, Mitsuhiro
Published in
ACM transactions on computational logic
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
2
Loading…
Bounded ACh unification
by
Eeralla, Ajay Kumar
,
Lynch, Christopher
Published in
Mathematical structures in computer science
Get full text
Items that this one cites
Article
Save to List
Saved in:
3
Loading…
Frequency-Minimal Utility-Maximal Moving Target Defense Against DDoS in SDN-Based Systems
by
Debroy, Saptarshi
,
Calyam, Prasad
,
Nguyen, Minh
,
Neupane, Roshan Lal
,
Mukherjee, Bidyut
,
Eeralla, Ajay Kumar
,
Salah, Khaled
Published in
IEEE eTransactions on network and service management
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
4
Loading…
Bounded ACh Unification
by
Eeralla, Ajay Kumar
,
Lynch, Christopher
Published in
arXiv.org
Get full text
Article
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit To
Peer Reviewed
3 results
3
Full Text
4 results
4
Format
Articles
4 results
4
Journal Title
Acm Transactions On Computational Logic
1 results
1
Arxiv.org
1 results
1
Ieee Etransactions On Network And Service Management
1 results
1
Mathematical Structures In Computer Science
1 results
1
Subjects
Computer Science
3 results
3
Science & Technology
3 results
3
Technology
3 results
3
Algorithms
2 results
2
Commutativity
2 results
2
Computer Science, Theory & Methods
2 results
2
Cryptography
2 results
2
Operators
2 results
2
Associativity
1 results
1
Authentication
1 results
1
Cloud Computing
1 results
1
Cloud Security
1 results
1
Computational Mathematics
1 results
1
Computational Model
1 results
1
Computational Soundness
1 results
1
Computer Science - Logic In Computer Science
1 results
1
Computer Science, Information Systems
1 results
1
Cryptographic Protocol Analysis
1 results
1
Cyberattack
1 results
1
Cybersecurity
1 results
1
Year of Publication
From:
To:
Source
Cambridge University Press:jisc Collections:full Collection Digital Archives (Stm And Hss) (218 Titles)
1 results
1
Acm Digital Library
1 results
1
Cambridge University Press
1 results
1
Association For Computing Machinery:jisc Collections:acm Open Journals 2023-2025 (Reading List)
1 results
1
Open Access: Freely Accessible Journals By Multiple Vendors
1 results
1
Ieee Electronic Library (Iel) Journals
1 results
1
Cambridge Journals Digital Archive: All To End 2021 Full Collection
1 results
1
Ieee Xplore All Journals
1 results
1
Road: Directory Of Open Access Scholarly Resources
1 results
1
Publicly Available Content Database (Proquest) (Pq Sdu P3)
1 results
1