Author of the publication

Design and Evaluation of A Data Partitioning-Based Intrusion Management Architecture for Database Systems.

, , , , , and . CoRR, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security and Performance Driven Architecture for Cloud Data Centers., , , , and . CoRR, (2020)Architectures for Detecting Interleaved Multi-Stage Network Attacks Using Hidden Markov Models., , , and . IEEE Trans. Dependable Secur. Comput., 18 (5): 2316-2330 (2021)Effects of Social Network Structure on Epidemic Disease Spread Dynamics with Application to Ad Hoc Networks., , , and . IEEE Netw., 33 (3): 139-145 (2019)Threat Management in Data-centric IoT-Based Collaborative Systems., , , and . ACM Trans. Internet Techn., 19 (3): 42:1-42:19 (2019)DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters., , , , , , and . ACSOS, page 109-118. IEEE, (2020)Machine Learning Models to Enhance the Science of Cognitive Autonomy., , , , , and . AIKE, page 46-53. IEEE Computer Society, (2018)A Partition-Driven Integrated Security Architecture for Cyber-Physical Systems., , , , and . CoRR, (2019)Design and Evaluation of A Data Partitioning-Based Intrusion Management Architecture for Database Systems., , , , , and . CoRR, (2018)Scalable Deep Learning through Fuzzy-Based Clustering in Autonomous Systems., , and . AIKE, page 146-151. IEEE Computer Society, (2018)Autonomous Aggregate Data Analytics in Untrusted Cloud., , , , and . AIKE, page 138-141. IEEE Computer Society, (2018)