Author of the publication

A Quantitative Methodology for Cloud Security Risk Assessment.

, , and . CLOSER, page 92-103. SciTePress, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain based Secured Virtual Machine Image Monitor., , and . ICISSP, page 432-439. SCITEPRESS, (2021)A Quantitative Methodology for Cloud Security Risk Assessment., , and . CLOSER, page 92-103. SciTePress, (2017)A low cost fully autonomous GPS (Global Positioning System) based quad copter for disaster management., , , , , , , , , and 1 other author(s). CCWC, page 654-660. IEEE, (2018)Cloud computing security challenges & solutions-A survey., , , , , , , , and . CCWC, page 347-356. IEEE, (2018)An Automated Methodology for Secured User Allocation in Cloud., , and . SSCC, volume 625 of Communications in Computer and Information Science, page 137-151. Springer, (2016)A cloud based autonomous multipurpose system with self-communicating bots and swarm of drones., , , , , , , , , and 2 other author(s). CCWC, page 649-653. IEEE, (2018)Securing Cloud Virtual Machine Image Using Ethereum Blockchain., , and . Int. J. Inf. Secur. Priv., 16 (1): 1-22 (2022)Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy., , and . Enterp. Inf. Syst., 10 (9): 1024-1046 (2016)Detection and Intelligent Control of Cloud Data Location Using Hyperledger Framework., , and . IEEE Trans. Consumer Electron., 69 (1): 76-86 (February 2023)Hyperledger based Verifiable and Secure Cloud Data Deletion., , , and . INFOCOM Workshops, page 1-6. IEEE, (2023)