Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approaches for optimizing virtual machine placement and migration in cloud environments: A survey., , , and . J. Parallel Distributed Comput., (2018)Security issues in cloud environments: a survey., , , , and . Int. J. Inf. Sec., 13 (2): 113-170 (2014)Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic., , , , and . Comput. J., 55 (6): 740-755 (2012)A tool for estimating the hurst parameter and for generating self-similar sequences., , , , and . SummerSim, page 40. SCS/ ACM, (2014)Performance evaluation of the SRE and SBPG components of the IoT hardware platform security advisor framework., , , , , , and . Comput. Networks, (2021)Improving software maintenance with improved bug triaging., , and . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part A): 8757-8764 (2022)How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses., , , and . CoRR, (2023)A Complete Review on the Application of Statistical Methods for Evaluating Internet Traffic Usage., , , , and . IEEE Access, (2022)Theoretical and practical assessments over SSH., , , , , and . Res. Pract. Technol. Enhanc. Learn., (2023)Classification of Encrypted Internet Traffic Using Kullback-Leibler Divergence and Euclidean Distance., , , , and . AINA, volume 1151 of Advances in Intelligent Systems and Computing, page 883-897. Springer, (2020)