Author of the publication

Event reconstruction using temporal pattern of file system modification.

, , and . IET Inf. Secur., 13 (3): 201-212 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Event reconstruction using temporal pattern of file system modification., , and . IET Inf. Secur., 13 (3): 201-212 (2019)A comprehensive survey on using fog computing in vehicular networks., , , and . Veh. Commun., (August 2023)Developing Software Signature Search Engines Using Paragraph Vector Model: A Triage Approach for Digital Forensics., , and . IEEE Access, (2021)Multi-criteria decision-making for controller placement in software-defined wide-area networks., and . J. Supercomput., 77 (11): 13447-13473 (2021)Queen-MAC: A quorum-based energy-efficient medium access control protocol for wireless sensor networks., , , and . Comput. Networks, 56 (8): 2221-2236 (2012)An SDN based framework for maximizing throughput and balanced load distribution in a Cloudlet network., , and . Future Gener. Comput. Syst., (2020)Correction to: SDN-based offloading policy to reduce the delay in fog-vehicular networks., and . Peer-to-Peer Netw. Appl., 14 (3): 1276 (2021)SDN-based offloading policy to reduce the delay in fog-vehicular networks., and . Peer-to-Peer Netw. Appl., 14 (3): 1261-1275 (2021)Energy-Efficient Data Gathering Framework-Based Clustering via Multiple UAVs in Deadline-Based WSN Applications., and . IEEE Access, (2018)Maximizing the Utilization of Fog Computing in Internet of Vehicle Using SDN., and . IEEE Communications Letters, 23 (1): 140-143 (2019)