Author of the publication

The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller based load balancing in SDN 5G.

, , and . Future Gener. Comput. Syst., (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Heterogeneous differential privacy for vertically partitioned databases., , , , and . Concurr. Comput. Pract. Exp., (2021)Virtualization of the Encryption Card for Trust Access in Cloud Computing., , , , , and . IEEE Access, (2017)Network intrusion detection based on the temporal convolutional model., , , , , , and . Comput. Secur., (December 2023)Static detection of real-world buffer overflow induced by loop., , , , , and . Comput. Secur., (2020)Obfuscation-resilient Android Malware Analysis Based on Contrastive Learning., , , , , and . CoRR, (2021)Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext., , , , , , and . IAS, page 73-78. IEEE, (2015)Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment., , , , , , and . IAS, page 61-66. IEEE, (2015)An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage., , , , , , and . BigDataSecurity/HPSC/IDS, page 412-417. IEEE, (2016)A Scalable Service Scheme for Secure Group Communication in Grid., , , , and . COMPSAC (1), page 31-38. IEEE Computer Society, (2007)Real-Time Strategy and Practice in Service Grid., , , , , and . COMPSAC, page 161-166. IEEE Computer Society, (2004)