Author of the publication

Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques.

, , , , , , , , , and . Comput. Syst. Sci. Eng., 48 (2): 363-394 (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ANFIS based hybrid approach identifying correlation between decision making and online social networks., , , , , , and . EAI Endorsed Trans. Scalable Inf. Syst., 8 (29): e4 (2021)Artificial general intelligence-based rational behavior detection using cognitive correlates for tracking online harms., , , , and . Pers. Ubiquitous Comput., 27 (1): 119-137 (2023)DeepFert: An Intelligent Fertility Rate Prediction Approach for Men Based on Deep Learning Neural Networks., , , , , , and . IEEE Access, (2023)Energy Reduction Through Memory Aware Real-Time Scheduling on Virtual Machine in Multi-Cores Server., , , , and . IEEE Access, (2021)Brain Tumor Detection and Multi-Grade Segmentation Through Hybrid Caps-VGGNet Model., , , , , and . IEEE Access, (2023)InteliRank: A Four-Pronged Agent for the Intelligent Ranking of Cloud Services Based on End-Users' Feedback., , , , , , and . Sensors, 22 (12): 4627 (2022)Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework., , , , , , and . Comput. Intell. Neurosci., (2022)Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques., , , , , , , , , and . Comput. Syst. Sci. Eng., 48 (2): 363-394 (2024)Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution., , , , and . EAI Endorsed Trans. Scalable Inf. Syst., 7 (28): e10 (2020)A secure and size efficient algorithm to enhance data hiding capacity and security of cover text by using unicode., , , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (5): 2180-2191 (2022)