Author of the publication

Botnet detection techniques: review, future trends, and issues.

, , , , , and . J. Zhejiang Univ. Sci. C, 15 (11): 943-983 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SAMI: Service-Based Arbitrated Multi-Tier Infrastructure for Mobile Cloud Computing, , , and . CoRR, (2012)Application partitioning algorithms in mobile cloud computing: Taxonomy, review and future directions., , , , , and . J. Netw. Comput. Appl., (2015)Botnet detection techniques: review, future trends, and issues., , , , , and . J. Zhejiang Univ. Sci. C, 15 (11): 943-983 (2014)RBM: Region-Based Mobile Routing Protocol for Wireless Sensor Networks., , , , , and . Wirel. Commun. Mob. Comput., (2021)Mobile crowd sensing based dynamic traffic efficiency framework for urban traffic congestion control., , , and . Sustain. Comput. Informatics Syst., (2021)Network forensics: Review, taxonomy, and open challenges., , , , and . J. Netw. Comput. Appl., (2016)A Novel Feature Selection Method for Classification of Medical Data Using Filters, Wrappers, and Embedded Approaches., , , , , and . Complex., (2022)An Extendable Simulation Framework for Modeling Application Processing Potentials of Smart Mobile Devices for Mobile Cloud Computing., , , and . FIT, page 331-336. IEEE Computer Society, (2012)A study on virtual machine deployment for application outsourcing in mobile cloud computing., , , and . J. Supercomput., 63 (3): 946-964 (2013)Investigation on runtime partitioning of elastic mobile applications for mobile cloud computing., , , and . J. Supercomput., 67 (1): 84-103 (2014)