Author of the publication

Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems.

, , and . CCGRID, page 534-543. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting JTAG and Its Mitigation in IOT: A Survey., and . Future Internet, 10 (12): 121 (2018)An Algebraic QoS-Based Resource Allocation Model for Competitive Multimedia Applications., and . Multim. Tools Appl., 13 (2): 197-212 (2001)Agent-based accountable grid computing systems., , and . J. Supercomput., 65 (2): 903-929 (2013)ProTaR: Probabilistic Tag Retardation for Missing Tag Identification in Large-Scale RFID Systems., , , , and . IEEE Trans. Ind. Informatics, 11 (2): 513-522 (2015)Network Policy Enforcement With Commodity Multiqueue NICs for Multitenant Data Centers., and . IEEE Internet Things J., 9 (8): 6252-6263 (2022)CDS-Based Virtual Backbone Construction with Guaranteed Routing Cost in Wireless Sensor Networks., , , , , and . IEEE Trans. Parallel Distributed Syst., 24 (4): 652-661 (2013)Characteristic Features of the Kernel-level Rootkit for Learning-based Detection Model Training., , and . MOBMU, page 1-6. Society for Imaging Science and Technology, (2021)Toward VANET Utopia: A New Privacy Preserving Trustworthiness Management Scheme for VANET., , , , and . BDCloud-SocialCom-SustainCom, page 301-308. IEEE Computer Society, (2016)Combating Adversarial Covert Channels in Wi-Fi Networks., , , , and . IEEE Access, (2022)WebProfiler: User Interaction Prediction Framework for Web Applications., and . IEEE Access, (2019)