Author of the publication

Probabilistic analysis of security attacks in cloud environment using hidden Markov models.

, , , and . Trans. Emerg. Telecommun. Technol., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions., , , , , , and . IEEE Access, (2023)Introduction to the Special Issue on Reliability and Security of e-Health Information Systems., and . Scalable Comput. Pract. Exp., 17 (3): iii-iv (2016)Traffic Shaping and Delay Optimization in Demand Side Management., , and . UKSim, page 722-727. IEEE, (2013)Lightweight security protocol for health monitoring in Ambient Assisted Living environment., , and . ICC Workshops, page 1282-1287. IEEE, (2017)A Distributed Algorithm with Optimum Communication for Cyber Physical Systems: Multi-tank Process Case Study., , and . SysCon, page 1-7. IEEE, (2019)An axiomatic model for formal specification requirements of ubiquitous healthcare systems.. CCNC, page 898-902. IEEE, (2013)Formalizing the movement of microparticles in a continuous flow microfluidic device for field flow fractionation., , , , and . HealthCom, page 114-119. IEEE, (2015)Formal Verification of Control Strategies for a Cyber Physical System., , and . ICDCS Workshops, page 91-96. IEEE Computer Society, (2017)Enhanced Not Recently Used Algorithm for Cache Memory Systems in Mobile Computing., , , , , , and . ACR, volume 700 of Lecture Notes in Networks and Systems, page 433-442. Springer, (2023)A Framework for Integrating Big Data Security Into Agricultural Supply Chain., , , , , , and . BigDataService, page 191-194. IEEE, (2019)