Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Security Monitoring for Cloud Analytic Applications., and . BigDataSecurity/HPSC/IDS, page 69-78. IEEE, (2018)IFCaaS: Information Flow Control as a Service for Cloud Security., and . ARES, page 211-216. IEEE Computer Society, (2016)Depicting Instant Messaging Encrypted Traffic Characteristics through an Empirical Study., , , , , and . ICCCN, page 1-10. IEEE, (2023)Advancing Security Services for Cloud Applications.. Queen's University at Kingston, Ontario, Canada, (2018)SLAM: SLA Monitoring Framework for Federated Cloud Services., , , and . UCC, page 506-511. IEEE Computer Society, (2015)OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-attack Simulation., , , , , and . ACM Trans. Cyber Phys. Syst., 6 (4): 33:1-33:27 (2022)Offering security diagnosis as a service for cloud SaaS applications., and . J. Inf. Secur. Appl., (2019)Large-scale multilevel streaming data analytics., , , , , and . CASCON, page 397-400. ACM, (2018)Encrypted Mobile Instant Messaging Traffic Dataset., , , , , and . (May 2023)A Classification of Intrusion Detection Systems in the Cloud., and . J. Inf. Process., 23 (4): 392-401 (2015)