Author of the publication

Leveraging a cloud-native architecture to enable semantic interconnectedness of data for cyber threat intelligence.

, , , and . Clust. Comput., 25 (5): 3629-3640 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Generalized Island Model Based on Parallel and Cooperating Metaheuristics for Effective Large Capacitated Vehicle Routing Problem Solving., and . J. Comput. Inf. Technol., 23 (2): 141-155 (2015)Blockchain for Modern Applications: A Survey., , , and . Sensors, 22 (14): 5274 (2022)An island model based genetic algorithm for solving the capacitated vehicle routing problem., and . SoCPaR, page 342-347. IEEE, (2014)Cyber Threat Hunting Case Study using MISP.. J. Internet Serv. Inf. Secur., 13 (2): 1-29 (May 2023)Blockchain for the Cybersecurity of Smart City Applications., , , , and . CoRR, (2022)Taxonomical Challenges for Cyber Incident Response Threat Intelligence: A Review., , , and . Int. J. Cloud Appl. Comput., 12 (1): 1-14 (2022)Secure and Privacy-aware Blockchain-based Remote Patient Monitoring System for Internet of Healthcare Things., , , , and . WiMob, page 200-205. IEEE, (2021)Internet of Everything Based Intelligent System for Sleep Recording and Analysis., , and . NiDS (1), volume 783 of Lecture Notes in Networks and Systems, page 327-337. Springer, (2023)Smart Energy Management Systems., , and . NiDS (2), volume 784 of Lecture Notes in Networks and Systems, page 1-8. Springer, (2023)A GRASP Algorithm Based on New Randomized Heuristic for Vehicle Routing Problem., , and . J. Comput. Inf. Technol., 21 (1): 37-48 (2013)