Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Avoiding DDoS with active management of backlog queues., and . NSS, page 310-315. IEEE, (2011)On trustworthy federated clouds: A coalitional game approach., , and . Comput. Networks, (2018)Security Risk Assessment Methodologies in The Internet of Things: Survey and Taxonomy., , and . QRS Companion, page 668-675. IEEE, (2021)Live Placement of Interdependent Virtual Machines to Optimize Cloud Service Profits and Penalties on SLAs., , and . IEEE Trans. Cloud Computing, 7 (1): 237-249 (2019)Evaluation and selection of Cloud security services based on Multi-Criteria Analysis MCA., and . ICNC, page 706-710. IEEE Computer Society, (2017)A Cooperative Game for Online Cloud Federation Formation Based on Security Risk Assessment., , and . CSCloud/EdgeCom, page 83-88. IEEE Computer Society, (2018)Service Assignment in Federated Cloud Environments Based on Multi-objective Optimization of Security., and . FiCloud, page 39-46. IEEE Computer Society, (2017)Towards quantification and evaluation of security of Cloud Service Providers., and . J. Inf. Secur. Appl., (2017)An Emergency Event Detection Ensemble Model Based on Big Data., and . Big Data Cogn. Comput., 6 (2): 42 (2022)A deep learning approach for proactive multi-cloud cooperative intrusion detection system., , , and . Future Gener. Comput. Syst., (2019)