Author of the publication

An Analysis of Open Standard Identity Protocols in Cloud Computing Security Paradigm.

, and . DASC/PiCom/DataCom/CyberSciTech, page 428-431. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relax, It's a Game: Utilising Gamification in Learning Agile Scrum Software Development., and . CoG, page 1-4. IEEE, (2019)D-FRI-CiscoFirewall: Dynamic Fuzzy Rule Interpolation for Cisco ASA Firewall., , , and . FUZZ-IEEE, page 1-6. IEEE, (2019)Urbanization, Urbanism, and Urbanity in an African City. (2013)Weakly Holomorphic Modular Forms in Prime Power Levels of Genus Zero., and . Integers, (2018)D-FRI-Honeypot: A Secure Sting Operation for Hacking the Hackers Using Dynamic Fuzzy Rule Interpolation., , , and . IEEE Trans. Emerg. Top. Comput. Intell., 5 (6): 893-907 (2021)A Ransomware Detection Method Using Fuzzy Hashing for Mitigating the Risk of Occlusion of Information Systems., , and . ISSE, page 1-6. IEEE, (2019)Governing Principles of Self-Sovereign Identity Applied to Blockchain Enabled Privacy Preserving Identity Management Systems., and . ISSE, page 1-6. IEEE, (2020)Your Identity is Yours: Take Back Control of Your Identity Using GDPR Compatible Self-Sovereign Identity., and . BESC, page 1-6. IEEE, (2020)Analysing Cyberattacks Using Attack Tree and Fuzzy Rules., , , , , , , and . UKCI, volume 1453 of Advances in Intelligent Systems and Computing, page 364-378. Springer, (2023)Evaluating Automatically Generated YARA Rules and Enhancing Their Effectiveness., , , , and . SSCI, page 1146-1153. IEEE, (2020)