Author of the publication

Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing.

, , , and . IEEE Trans. Dependable Secur. Comput., 14 (1): 95-108 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Traffic Localities for Efficient Flow State Lookup., , and . NETWORKING, volume 3462 of Lecture Notes in Computer Science, page 1133-1145. Springer, (2005)Adjusted Probabilistic Packet Marking for IP Traceback., , and . NETWORKING, volume 2345 of Lecture Notes in Computer Science, page 697-708. Springer, (2002)Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis., , and . Networking, volume 3976 of Lecture Notes in Computer Science, page 1092-1098. Springer, (2006)Approximating Dunn's Cluster Validity Indices for Partitions of Big Data., , , , and . IEEE Trans. Cybern., 49 (5): 1629-1641 (2019)Improving Personalized Trip Recommendation by Avoiding Crowds., , , , and . CIKM, page 25-34. ACM, (2016)A Game Theoretical Approach to Defend Against Co-Resident Attacks in Cloud Computing: Preventing Co-Residence Using Semi-Supervised Learning., , , , and . IEEE Trans. Inf. Forensics Secur., 11 (3): 556-570 (2016)Urban Sensing for Anomalous Event Detection: - Distinguishing Between Legitimate Traffic Changes and Abnormal Traffic Variability., , , , , , and . ECML/PKDD (3), volume 11053 of Lecture Notes in Computer Science, page 553-568. Springer, (2018)A Bayesian Classifier for Learning from Tensorial Data., , , , , and . ECML/PKDD (2), volume 8189 of Lecture Notes in Computer Science, page 483-498. Springer, (2013)It's PageRank All The Way Down: Simplifying Deep Graph Networks., , , , and . SDM, page 172-180. SIAM, (2023)An Efficient Adversarial Learning Strategy for Constructing Robust Classification Boundaries., , , , and . Australasian Conference on Artificial Intelligence, volume 7691 of Lecture Notes in Computer Science, page 649-660. Springer, (2012)