Author of the publication

Secure and Resilient Cloud Services for Enhanced Living Environments.

, , , and . IEEE Cloud Comput., 3 (6): 44-52 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly Behavior Analysis of DNS Protocol., , , and . J. Internet Serv. Inf. Secur., 5 (4): 85-97 (2015)Autoinfotainment Security Development Framework (ASDF) for Smart Cars., , , and . ICCAC, page 153-159. IEEE Computer Society, (2017)Malicious HTML File Prediction: A Detection and Classification Perspective with Noisy Data., , , and . AICCSA, page 1-7. IEEE Computer Society, (2018)Secure and Resilient Cloud Services for Enhanced Living Environments., , , and . IEEE Cloud Comput., 3 (6): 44-52 (2016)Artificial Neural Networks-Based Intrusion Detection System for Internet of Things Fog Nodes., , , and . IEEE Access, (2020)Teaching and Training Cybersecurity as a Cloud Service., , , , , and . ICCAC, page 302-308. IEEE Computer Society, (2015)Cross Layer Anomaly Based Intrusion Detection System.. SASO Workshops, page 157-161. IEEE Computer Society, (2015)Anomaly Based Wi-Fi Intrusion Detection System.. FAS*W@SASO/ICCAC, page 377-378. IEEE Computer Society, (2017)Bluetooth Intrusion Detection System (BIDS)., , and . AICCSA, page 1-7. IEEE Computer Society, (2018)Wireless Anomaly Detection Based on IEEE 802.11 Behavior Analysis., , , and . IEEE Trans. Inf. Forensics Secur., 10 (10): 2158-2170 (2015)