Author of the publication

Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice.

, , , and . INCoS, page 181-188. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on Small Object Detection in UAV Reconnaissance Images Based on Haar-Like Features and MobileNet-SSD Algorithm., , , , and . CSIA (1), volume 1342 of Advances in Intelligent Systems and Computing, page 708-717. Springer, (2021)Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust., , and . TrustCom, page 1179-1186. IEEE, (2020)Enhancing Trust-based Medical Smartphone Networks via Blockchain-based Traffic Sampling., , and . TrustCom, page 122-129. IEEE, (2021)Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion Detection., , and . HPCC/EUC, page 175-182. IEEE, (2013)Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling., , , and . CSS, volume 10581 of Lecture Notes in Computer Science, page 163-175. Springer, (2017)Ground temperature measurements to verify thermal anomaly observed on satellite image of arid ecosystem across the Israel-Egypt border., , , , and . IGARSS, page 4651-4654. IEEE, (2004)A Blockchain-based Trusted Service Mechanism for Crowdsourcing System., , , , , and . VTC Spring, page 1-6. IEEE, (2020)Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones., , and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 55-68. Springer, (2013)Evaluating the effect of user guidelines on creating click-draw based graphical passwords., and . RACS, page 322-327. ACM, (2012)Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice., , , and . Trustcom/BigDataSE/ISPA, page 1061-1068. IEEE, (2016)