Author of the publication

A Game Theoretic approach based virtual machine migration for cloud environment security.

, , , , and . Int. J. Commun. Networks Inf. Secur., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cooperative transmission scheme for multi-hop underwater acoustic sensor networks., and . Int. J. Commun. Networks Distributed Syst., 14 (1): 1-18 (2015)Deep Q-learning based resource allocation in industrial wireless networks for URLLC., , and . IET Commun., 14 (6): 1022-1027 (2020)Efficient-spectrum management based on localisation of primary user position towards 5G., , and . IET Commun., 14 (20): 3567-3577 (2020)Reconstruct unrecoverable data in real-time networks using Bézier curve., , and . IET Commun., 9 (5): 596-602 (2015)Security modelling and assessment of modern networks using time independent Graphical Security Models., , and . J. Netw. Comput. Appl., (2019)Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense., , , , , , , , and . CoRR, (2019)Quantitative intrusion intensity assessment for intrusion detection systems., , , and . Secur. Commun. Networks, 5 (10): 1199-1208 (2012)Digital twin-enabled 3D printer fault detection for smart additive manufacturing., , , and . Eng. Appl. Artif. Intell., (2023)Deep Q-learning based sparse code multiple access for ultra reliable low latency communication in industrial wireless networks., and . Telecommun. Syst., 83 (4): 409-421 (August 2023)CNN-Based Automatic Modulation Classification for Beyond 5G Communications., , , and . IEEE Commun. Lett., 24 (5): 1038-1041 (2020)