Author of the publication

Model Based Migration of Cloud Systems: Review and Roadmap.

, , and . ICCSA (1), volume 13375 of Lecture Notes in Computer Science, page 249-264. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Arabic Cursive Characters Distributed Recognition using the DTW Algorithm on BOINC : Performance Analysis, , and . IJACSA - International Journal of Advanced Computer Science and Applications, 2 (3): 75--79 (2011)Data protection in cloud computing: A Survey of the State-of-Art., , and . KES, volume 159 of Procedia Computer Science, page 155-161. Elsevier, (2019)Model Based Migration of Cloud Systems: Review and Roadmap., , and . ICCSA (1), volume 13375 of Lecture Notes in Computer Science, page 249-264. Springer, (2022)Preventing Sybil attacks in chord and Kademlia protocols.. Int. J. Internet Protoc. Technol., 12 (3): 157-166 (2019)Mitigation of Sybil Attacks in Structured P2P Overlay Networks., and . SKG, page 245-248. IEEE Computer Society, (2012)Towards a Better Security in Public Cloud Computing., , and . HIS, volume 1179 of Advances in Intelligent Systems and Computing, page 441-453. Springer, (2019)Securing Structured P2P Overlay Networks., and . 3PGCIC, page 37-43. IEEE, (2013)A novel replication technique to attenuate churn effects., and . Peer-to-Peer Netw. Appl., 9 (2): 344-355 (2016)A Framework for Monitoring and Mitigating Malicious Attacks in Structured P2P Overlay Networks., and . AICCSA, page 128-134. IEEE Computer Society, (2017)Pollution Attacks Identification in Structured P2P Overlay Networks., , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 674-686. Springer, (2017)