Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Selective Mobile Cloud Offloading to Augment Multi-Persona Performance and Viability., , , and . IEEE Trans. Cloud Computing, 7 (2): 314-328 (2019)ITADP: An inter-tenant attack detection and prevention framework for multi-tenant SaaS., , and . J. Inf. Secur. Appl., (2019)Multi-Tenant Intrusion Detection Framework as a Service for SaaS., , , and . IEEE Trans. Serv. Comput., 15 (5): 2925-2938 (2022)TD-PSO: Task distribution approach based on particle swarm optimization for vehicular ad hoc network., , , and . Trans. Emerg. Telecommun. Technol., (2022)Independent and Identically Distributed (IID) Data Assessment in Federated Learning., , , , , and . GLOBECOM, page 293-298. IEEE, (2022)Combining heterogeneous anomaly detectors for improved software security., , , and . J. Syst. Softw., (2018)Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process., , , and . Secur. Commun. Networks, 9 (16): 3483-3495 (2016)ModularFed: Leveraging Modularity in Federated Learning Frameworks., , , , , and . CoRR, (2022)An anomaly detection system based on variable N-gram features and one-class SVM., , , and . Inf. Softw. Technol., (2017)Attribute-Based Encryption for Preserving Smart Home Data Privacy., , , and . ICOST, volume 10461 of Lecture Notes in Computer Science, page 185-197. Springer, (2017)