Author of the publication

CIADL: cloud insider attack detector and locator on multi-tenant network isolation: an OpenStack case study.

, , , , , and . J. Ambient Intell. Humaniz. Comput., 11 (9): 3473-3495 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A large dynamic-range, high dB-linearity VGA using switch arrays and second-order mismatch-shaping DEM technique., , , and . I. J. Circuit Theory and Applications, 44 (3): 693-708 (2016)Research on theory and key technology of trusted computing platform security testing and evaluation., , , , , , and . Sci. China Inf. Sci., 53 (3): 434-453 (2010)Research on Automated Testing of the Trusted Platform Model., , , and . ICYCS, page 2335-2339. IEEE Computer Society, (2008)Building Trusted Sub-domain for the Grid with Trusted Computing., , and . Inscrypt, volume 4990 of Lecture Notes in Computer Science, page 463-471. Springer, (2007)Trust management for mobile agent system based on trusted computing platforms., , and . WCNIS, page 717-721. IEEE, (2010)Automatic Rules Generation for Teaching Strategies Improvement., , and . CSAE, page 97:1-97:5. ACM, (2020)Noncontact Monitoring of Heart Rate Variability Using a Fiber Optic Sensor., , , , , and . IEEE Internet Things J., 10 (17): 14988-14994 (September 2023)A fully integrated feedback AGC loop for ZigBee (IEEE 802.15.4) RF transceiver applications., , , , and . Microelectron. J., 45 (6): 657-665 (2014)Privacy protection for fog computing and the internet of things data based on blockchain., , and . Clust. Comput., 24 (2): 1331-1345 (2021)Dust and Reflection Removal from Videos Captured in Moving Car., , , , , and . ICEBE, page 182-187. IEEE Computer Society, (2016)