Author of the publication

A Study on Cloud Forensics and Challenges in SaaS Application Environment.

, , , , , and . HPCC/SmartCity/DSS, page 734-740. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CNN-based anomaly detection for packet payloads of industrial control system., , , , and . Int. J. Sens. Networks, 36 (1): 36-49 (2021)Quantitative analysis of measurement overhead for integrity verification., , , , , , , and . SAC, page 1528-1533. ACM, (2017)A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping., , , and . USENIX Security Symposium, page 1229-1246. USENIX Association, (2018)Efficient file fuzz testing using automated analysis of binary file format., , and . J. Syst. Archit., 57 (3): 259-268 (2011)Update State Tampering: A Novel Adversary Post-compromise Technique on Cyber Threats., , , and . DIMVA, volume 10885 of Lecture Notes in Computer Science, page 141-161. Springer, (2018)A Study on Cloud Forensics and Challenges in SaaS Application Environment., , , , , and . HPCC/SmartCity/DSS, page 734-740. IEEE Computer Society, (2016)Revitalizing Self-Organizing Map: Anomaly Detection Using Forecasting Error Patterns., , , , and . SEC, volume 625 of IFIP Advances in Information and Communication Technology, page 382-397. Springer, (2021)Extended Role Based Access Control and Procedural Restrictions., , , , and . ICISC, volume 2971 of Lecture Notes in Computer Science, page 184-196. Springer, (2003)JsSandbox: A Framework for Analyzing the Behavior of Malicious JavaScript Code using Internal Function Hooking., , and . KSII Trans. Internet Inf. Syst., 6 (2): 766-783 (2012)