Author of the publication

Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study.

, , , , and . IEEE Trans. Sustain. Comput., 4 (2): 204-216 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective Dimensionality Reduction of Payload-Based Anomaly Detection in TMAD Model for HTTP Payload., , , and . KSII Trans. Internet Inf. Syst., 10 (8): 3884-3910 (2016)The Impact of Memory-Efficient Bots on IoT-WSN Botnet Propagation., , , and . Wirel. Pers. Commun., 119 (3): 2093-2105 (2021)Issues and Challenges in Anomaly Intrusion Detection for HTTP Web Services., , , , and . J. Comput. Sci., 11 (11): 1041-1053 (2015)Mobile forensic data acquisition in Firefox OS., , , and . CyberSec, page 27-31. IEEE, (2014)An effective security alert mechanism for real-time phishing tweet detection on Twitter., , , , and . Comput. Secur., (2019)A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts., , , , , and . SpaCCS Workshops, volume 10067 of Lecture Notes in Computer Science, page 342-357. (2016)Malicious node identification routing and protection mechanism for vehicular ad-hoc network against various attacks., , , and . Int. J. Netw. Virtual Organisations, 19 (2/3/4): 153-175 (2018)An overview of attacks against digital watermarking and their respective countermeasures., , , and . CyberSec, page 265-270. IEEE, (2012)Structural features with nonnegative matrix factorization for metamorphic malware detection., , , and . Comput. Secur., (2021)An intelligent DDoS attack detection tree-based model using Gini index feature selection method., , , , and . Microprocess. Microsystems, (April 2023)