Author of the publication

Secure and Resilient Cloud Services for Enhanced Living Environments.

, , , and . IEEE Cloud Comput., 3 (6): 44-52 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Artificial Neural Networks-Based Intrusion Detection System for Internet of Things Fog Nodes., , , and . IEEE Access, (2020)WIDS: An Anomaly Based Intrusion Detection System for Wi-Fi (IEEE 802.11) Protocol., and . IEEE Trans. Netw. Serv. Manag., 18 (1): 1077-1091 (2021)A Methodology to Design Intrusion Detection Systems (IDS) for IoT/Networking Protocols.. University of Arizona, Tucson, USA, (2019)base-search.net (ftunivarizona:oai:repository.arizona.edu:10150/632978).Teaching and Training Cybersecurity as a Cloud Service., , , , , and . ICCAC, page 302-308. IEEE Computer Society, (2015)Cross Layer Anomaly Based Intrusion Detection System.. SASO Workshops, page 157-161. IEEE Computer Society, (2015)Secure and Resilient Cloud Services for Enhanced Living Environments., , , and . IEEE Cloud Comput., 3 (6): 44-52 (2016)Anomaly Behavior Analysis of DNS Protocol., , , and . J. Internet Serv. Inf. Secur., 5 (4): 85-97 (2015)Autoinfotainment Security Development Framework (ASDF) for Smart Cars., , , and . ICCAC, page 153-159. IEEE Computer Society, (2017)Malicious HTML File Prediction: A Detection and Classification Perspective with Noisy Data., , , and . AICCSA, page 1-7. IEEE Computer Society, (2018)Multi-Layer Mapping of Cyberspace for Intrusion Detection., , , , , , and . AICCSA, page 1-8. IEEE, (2021)