Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deadline-constraint services in cloud with heterogeneous servers., , , , and . CITS, page 20-24. IEEE, (2017)Poster: A Learning Automata-based DDoS Attack Defense Mechanism in Software Defined Networks., , , , , and . MobiCom, page 795-797. ACM, (2018)A YCbCr Model Based Shadow Detection and Removal Approach On Camouflaged Images., , and . OCIT, page 574-579. IEEE, (2022)Toward secure software-defined networks against distributed denial of service attack., , , , and . J. Supercomput., 75 (8): 4829-4874 (2019)Game Theoretic Approach for Real-Time Task Scheduling in Cloud Computing Environment., , , and . ICIT, page 454-459. IEEE, (2019)An Energy-Efficient Scheduling Framework for Cloud Using Learning Automata., , and . ICCCNT, page 1-5. IEEE, (2018)Video delivery services in media cloud with abandonment: An analytical approach., , , , and . ANTS, page 1-6. IEEE, (2017)Allocation of energy-efficient task in cloud using DVFS., , , and . Int. J. Comput. Sci. Eng., 18 (2): 154-163 (2019)RT-PUSH: a VM fault detector for deadline-based tasks in cloud., , and . ICCIP, page 196-201. ACM, (2017)Co-resident Attack in Cloud Computing: An Overview., , , and . Encyclopedia of Big Data Technologies, Springer, (2019)