Author of the publication

A comprehensive survey of security threats and their mitigation techniques for next-generation SDN controllers.

, , , , , , and . Concurr. Comput. Pract. Exp., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social-aware peer discovery and resource allocation for device-to-device communication., , , , and . DMIAF, page 83-88. IEEE, (2016)Joint Access Selection and Resource Allocation in Cache-Enabled HCNs with D2D Communications., , , , , and . WCNC, page 1-6. IEEE, (2017)FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks., , , , , , and . IEEE Access, (2020)Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites., , and . EvoApplications, volume 12104 of Lecture Notes in Computer Science, page 117-132. Springer, (2020)Hybrid Tree-Rule Firewall for High Speed Data Transmission., , , and . IEEE Trans. Cloud Comput., 8 (4): 1237-1249 (2020)Introduction to the Special Issue on Privacy and Security in Evolving Internet of Multimedia Things., , , and . ACM Trans. Multim. Comput. Commun. Appl., 16 (3s): 93:1-93:3 (2020)Vehicular Computation Offloading for Industrial Mobile Edge Computing., , , , , , and . IEEE Trans. Ind. Informatics, 17 (11): 7871-7881 (2021)A Novel Web Attack Detection System for Internet of Things via Ensemble Classification., , , , , and . IEEE Trans. Ind. Informatics, 17 (8): 5810-5818 (2021)ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System., , , , , and . IEEE Access, (2019)Intrusion detection method based on nonlinear correlation measure., , , , , and . Int. J. Internet Protoc. Technol., 8 (2/3): 77-86 (2014)