Author of the publication

Security risk assessment framework for cloud computing environments.

, , , , and . Secur. Commun. Networks, 7 (11): 2114-2124 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Novel Attack Detection Using Fuzzy Logic and Data Mining., and . Security and Management, page 26-31. CSREA Press, (2006)Distributed Intrusion Detection trust management through integrity and expertise evaluation., , and . CyberSec, page 133-138. IEEE, (2012)Leveraging Remote Attestation to enhance the Unified Trust Model for WSNs., , and . CyberSec, page 139-143. IEEE, (2012)A New Decentralized Certification Verification Privacy Control Protocol., , and . CRC, page 1-6. IEEE, (2021)CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism., , and . Int. J. Commun. Networks Inf. Secur., (2017)Integrating Software Traceability for Change Impact Analysis., , , and . Int. Arab J. Inf. Technol., 2 (4): 301-308 (2005)Implementing a Document-based Requirements Traceability: A Case Study., , , and . IASTED Conf. on Software Engineering, page 124-131. IASTED/ACTA Press, (2005)Production and Maintenance of System Documentation: What, Why, When and How Tools Should Support the Practice., , and . APSEC, page 558-. IEEE Computer Society, (2002)A Unified Trust Model for Pervasive Environments - Simulation and Analysis., , and . KSII Trans. Internet Inf. Syst., 7 (7): 1569-1584 (2013)Integration of Secrecy Features in a Federated Database Environment., , and . DBSec, volume A-47 of IFIP Transactions, page 89-108. North-Holland, (1993)