Author of the publication

A survey on security issues in service delivery models of cloud computing.

, and . J. Netw. Comput. Appl., 34 (1): 1-11 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Metadata Based Storage Model for Securing Data in Cloud Environment., and . CyberC, page 429-434. IEEE Computer Society, (2011)A survey on security issues in service delivery models of cloud computing., and . J. Netw. Comput. Appl., 34 (1): 1-11 (2011)Automated assessment of breast tissue density in digital mammograms., , and . Comput. Vis. Image Underst., 114 (1): 33-43 (2010)Breast mass classification based on cytological patterns using RBFNN and SVM., , and . Expert Syst. Appl., 36 (3): 5284-5290 (2009)A Secure and Robust Image Watermarking System Using Normalization and Arnold Scrambling., and . Int. J. Netw. Secur., 18 (5): 832-841 (2016)YOLOAPPLE: Augment Yolov3 deep learning algorithm for apple fruit quality detection., , , , and . Signal Image Video Process., 18 (1): 119-128 (February 2024)Detection of Cardiac Abnormality from Measures Calculated from Segmented Left Ventricle in Ultrasound Videos., and . MIKE, volume 8284 of Lecture Notes in Computer Science, page 251-259. Springer, (2013)Application of local invariant symmetry features to detect and localize image copy move forgeries., and . J. Inf. Secur. Appl., (2019)Detection and Removal of Scratches in Images., , and . MIKE, volume 8284 of Lecture Notes in Computer Science, page 212-223. Springer, (2013)SSD based waste separation in smart garbage using augmented clustering NMS., , and . Autom. Softw. Eng., 28 (2): 17 (2021)