Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives., , , , , and . Neural Comput. Appl., 32 (17): 13651-13678 (2020)Privacy and National Security Issues in Social Networks: The Challenges., , , and . CoRR, (2014)Deep learning architectures in emerging cloud computing architectures: Recent development, challenges and next research trend., , , , , and . Appl. Soft Comput., (2020)An adaptive symbiotic organisms search for constrained task scheduling in cloud computing., , , and . J. Ambient Intell. Humaniz. Comput., 14 (7): 8839-8850 (July 2023)Detecting ransomware attacks using intelligent algorithms: recent development and next direction from deep learning and big data perspectives., , , , , , , and . J. Ambient Intell. Humaniz. Comput., 12 (9): 8699-8717 (2021)Secure E-Examination Systems Compared: Case Studies from Two Countries., , and . J. Inf. Technol. Educ. Innov. Pract., (2017)Whale optimization algorithm: a systematic review of contemporary applications, modifications and developments., , , and . Neural Comput. Appl., 32 (20): 16245-16277 (2020)Recent advancements in resource allocation techniques for cloud computing environment: a systematic review., , , and . Clust. Comput., 20 (3): 2489-2533 (2017)The Impact of Mitigation Strategies for Socio-Cultural Distance Issues in GSD: An Empirical Study., , , , and . IEEE Access, (2023)On-Demand Grid Provisioning Using Cloud Infrastructures and Related Virtualization Tools: A Survey and Taxonomy., , and . CoRR, (2014)