Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey on security issues and solutions at different layers of Cloud computing., , , , and . J. Supercomput., 63 (2): 561-592 (2013)Tradeoffs between performance and security of cryptographic primitives used in storage as a service for cloud computing., , , , and . CUBE, page 557-560. ACM, (2012)Optimizing the Replay Protection at the Link Layer Security Framework in Wireless Sensor Networks, , , and . CoRR, (2012)ExplicitPRISMSymm: Symmetry Reduction Technique for Explicit Models in PRISM., , and . TAMC, volume 9076 of Lecture Notes in Computer Science, page 400-412. Springer, (2015)A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing., and . CICS, page 23-30. IEEE, (2013)Load balancing in cloud using improved gray wolf optimizer., and . Concurr. Comput. Pract. Exp., (2022)Towards cough sound analysis using the Internet of things and deep learning for pulmonary disease prediction., , , , , , , , and . Trans. Emerg. Telecommun. Technol., (2022)Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009-2020)., , , , , and . J. Netw. Comput. Appl., (2021)Supervised learning model for identifying illegal activities in Bitcoin., , , , , and . Appl. Intell., 51 (6): 3824-3843 (2021)Incorporating Honeypot for Intrusion Detection in Cloud Infrastructure., , , and . IFIPTM, volume 374 of IFIP Advances in Information and Communication Technology, page 84-96. Springer, (2012)