Author of the publication

Entropy-based denial-of-service attack detection in cloud data center.

, , , , and . Concurr. Comput. Pract. Exp., 27 (18): 5623-5639 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Physarum-inspired Model for the Probit-based Stochastic User Equilibrium Problem., , and . Int. J. Unconv. Comput., 13 (2): 139-159 (2017)Probing the entanglement distillability responses to the Unruh effect and prepared states., , , , and . Quantum Inf. Process., 14 (4): 1411-1428 (2015)LPP2KL: Online Location Privacy Protection Against Knowing-and-Learning Attacks for LBSs., , , and . IEEE Trans. Comput. Soc. Syst., 10 (1): 234-245 (February 2023)MRP2Rec: Exploring Multiple-Step Relation Path Semantics for Knowledge Graph-Based Recommendations., , , , and . IEEE Access, (2020)Improved Position Estimation Method for SRM Considering Current Measurement Errors., , , , and . IEEE Trans. Instrum. Meas., (2022)Open-Switch Fault-Tolerant Operation of T-Type Active Neutral-Point-Clamped Converter Using Level-Shifted PWM., , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 68 (7): 2598-2602 (2021)Deep retinex decomposition network for underwater image enhancement., , , , , , , , and . Comput. Electr. Eng., (2022)A generalization of a theorem of Rothschild and van Lint., , and . Theor. Comput. Sci., (April 2023)The object localisation based on multiple image information for a humanoid robot., , and . IJCSM, 7 (4): 371-380 (2016)Exponential Gradient with Momentum for Online Portfolio Selection., , , , and . Expert Syst. Appl., (2022)