From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

VM Profile Based Optimized Network Attack Pattern Detection Scheme for DDOS Attacks in Cloud., и . SSCC, том 377 из Communications in Computer and Information Science, стр. 255-261. Springer, (2013)Learning Algorithms in Static Analysis of Web Applications., , , , , и . CoRR, (2022)A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment., , и . IJDSN, (2013)Ontology Based Information Retrieval for Learning Styles of Autistic People., и . HPAGC, том 169 из Communications in Computer and Information Science, стр. 293-298. Springer, (2011)A light weight centralized file monitoring approach for securing files in Cloud environment., , и . ICITST, стр. 382-387. IEEE, (2012)Collaborative teaching in large classes of computer science courses., , , , , , , , и . IC3, стр. 397-403. IEEE Computer Society, (2015)Secure Private Cloud Architecture for Mobile Infrastructure as a Service., , , и . SERVICES, стр. 149-154. IEEE Computer Society, (2012)A secure and lightweight approach for critical data security in cloud., , , и . CASoN, стр. 315-320. IEEE, (2012)A fingerprinting system calls approach for intrusion detection in a cloud environment., , , и . CASoN, стр. 309-314. IEEE, (2012)A Hybrid Intrusion Detection Architecture for Defense against DDoS Attacks in Cloud Environment., , и . IC3, том 306 из Communications in Computer and Information Science, стр. 498-499. Springer, (2012)