Author of the publication

Design Considerations for an Intelligent Video Surveillance System Using Cloud Computing.

, , , and . PDCAT, volume 931 of Communications in Computer and Information Science, page 84-89. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure mobile device structure for trust IoT., , , and . J. Supercomput., 74 (12): 6646-6664 (2018)A new proposal for a digital evidence container for security convergence., , and . ICCSCE, page 171-175. (2011)A Study on the Recovery Method of PPG Signal for IPI-Based Key Exchange., , , , and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 353-358. Springer, (2018)A Methodology for Forensic Analysis of Embedded Systems., and . FGCN (2), page 283-286. IEEE Computer Society, (2008)978-0-7695-3431-2.An Efficient Secure Scheme Based on Hierarchical Topology in the Smart Home Environment., , , and . Symmetry, 9 (8): 143 (2017)Development of Unidirectional Security Gateway Satisfying Security Functional Requirements., , and . MUE/FutureTech, volume 448 of Lecture Notes in Electrical Engineering, page 709-714. (2017)On-the-spot digital investigation by means of LDFS: Live Data Forensic System., , , and . Math. Comput. Model., 55 (1-2): 223-240 (2012)A Stepwise Methodology for Tracing Computer Usage., , , , and . NCM, page 1852-1857. IEEE Computer Society, (2009)Methodologies for Detecting Covert Database., , , , , and . IIH-MSP, page 538-541. IEEE Computer Society, (2008)Design Considerations for an Intelligent Video Surveillance System Using Cloud Computing., , , and . PDCAT, volume 931 of Communications in Computer and Information Science, page 84-89. Springer, (2018)