Author of the publication

Data reduction by identification and correlation of TCP/IP attack attributes for network forensics.

, , and . ICWET, page 276-283. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BGSA: Broker Guided Service Allocation in Federated Cloud., , and . Sustain. Comput. Informatics Syst., (2021)A Framework for Network Forensic Analysis., , and . ICT, volume 101 of Communications in Computer and Information Science, page 142-147. Springer, (2010)Task Clustering-Based Energy-Aware Workflow Scheduling in Cloud Environment., , , , and . HPCC/SmartCity/DSS, page 968-973. IEEE, (2018)Energy-efficient fuzzy-based approach for dynamic virtual machine consolidation., , , , and . Int. J. Grid Util. Comput., 10 (4): 308-325 (2019)A Taxonomy of Hypervisor Forensic Tools., , and . IFIP Int. Conf. Digital Forensics, volume 589 of IFIP Advances in Information and Communication Technology, page 181-199. Springer, (2020)A shortest path approach to SPARQL chain query optimisation., , and . ICACCI, page 1778. IEEE, (2017)Brokering in interconnected cloud computing environments: A survey., , , , and . J. Parallel Distributed Comput., (2019)Botnet Forensic: Issues, Challenges and Good Practices., , and . Netw. Protoc. Algorithms, 10 (2): 28-51 (2018)Obviating capricious behavior in internet of things., , and . ICACCI, page 480-486. IEEE, (2017)RraR: Robust Recommendation Aggregation using Retraining in Internet of Things., , and . WF-IoT, page 76-80. IEEE, (2019)