Lijo Thomas

According to our database1, Lijo Thomas authored at least 12 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
DREAMS After-School Programme for the Holistic Development of Children Amid Covid-19.
Int. J. Virtual Pers. Learn. Environ., 2022

Implementation of Bus Priority System using DSRC Communication.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

Development of a Departure Time Planner using Quasi-Connected Vehicle Systems.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

2021
Packet Delivery Deadline Time in the Routing Header for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs).
RFC, June, 2021

2017
6TiSCH operation sublayer (6top) implementation on Contiki OS.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

2015
An Automated Test Generation Technique for Software Quality Assurance.
IEEE Trans. Reliab., 2015

Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets.
IEEE Trans. Computers, 2015

2012
Automated Security Test Generation with Formal Threat Models.
IEEE Trans. Dependable Secur. Comput., 2012

A model-based approach to automated testing of access control policies.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

2011
Mutation Analysis of Magento for Evaluating Threat Model-Based Security Testing.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Using gaming strategies for attacker and defender in recommender systems.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2011

Phishing detection using stochastic learning-based weak estimators.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011


  Loading...