Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security and Performance Driven Architecture for Cloud Data Centers., , , , and . CoRR, (2020)Machine Learning Models to Enhance the Science of Cognitive Autonomy., , , , , and . AIKE, page 46-53. IEEE Computer Society, (2018)DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters., , , , , , and . ACSOS, page 109-118. IEEE, (2020)Design and Evaluation of A Data Partitioning-Based Intrusion Management Architecture for Database Systems., , , , , and . CoRR, (2018)Scalable Deep Learning through Fuzzy-Based Clustering in Autonomous Systems., , and . AIKE, page 146-151. IEEE Computer Society, (2018)Autonomous Aggregate Data Analytics in Untrusted Cloud., , , , and . AIKE, page 138-141. IEEE Computer Society, (2018)An MTD-Based Self-Adaptive Resilience Approach for Cloud Systems., , , , , , and . CLOUD, page 723-726. IEEE Computer Society, (2017)Securing Intelligent Autonomous Systems Through Artificial Intelligence., , , , and . ISIC, volume 2786 of CEUR Workshop Proceedings, page 67-71. CEUR-WS.org, (2021)A Partition-Driven Integrated Security Architecture for Cyberphysical Systems., , , , and . Computer, 53 (3): 47-56 (2020)Privacy-Preserving Data Dissemination in Untrusted Cloud., , , , , , , , and . CLOUD, page 770-773. IEEE Computer Society, (2017)