Author of the publication

A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms.

, , , , , and . Int. J. Netw. Secur., 22 (4): 638-644 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An overview of long-range dependent network traffic engineering and analysis: characteristics, simulation, modelling and control., and . VALUETOOLS, page 29. ICST/ACM, (2007)Towards secure information systems in online banking., , and . ICITST, page 1-6. IEEE, (2009)Identifying Long-range Dependent Network Traffic through Autocorrelation Functions., and . LCN, page 692-697. IEEE Computer Society, (2007)A Literature Survey on Information Security in Online Banking., , and . CSREA EE, page 218-225. CSREA Press, (2009)E-Banking and Its Impact on Banks' Performance and Consumers' Behaviour., , and . ICDS, page 238-242. IEEE Computer Society, (2010)A Pragmatic Approach for Controlling Internet Traffic: Burstiness and Long-range Dependence., and . International Conference on Internet Computing, page 183-190. CSREA Press, (2007)Detection, quantification and classification of ripened tomatoes: a comparative analysis of image processing and machine learning., , , , and . IET Image Process., 14 (11): 2442-2456 (2020)Finding an effective and secured information system in e-commerce environment., , and . ICITST, page 1-8. IEEE, (2009)BPTraSha: A Novel Algorithm for Shaping Bursty Nature of Internet Traffic., and . AICT, page 8. IEEE Computer Society, (2007)A Weighted Scoring Based Rating Scale to Identify the Severity Level of Mathematics Anxiety in Students., , , and . Int. J. Interact. Mob. Technol., 15 (8): 18-30 (2021)