Author of the publication

Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing.

, and . Multimedia Tools Appl., 78 (4): 4267-4298 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defending against Phishing Attacks: Taxonomy of Methods, Current Issues and Future Directions., , and . CoRR, (2017)Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations., , , , , and . IEEE Internet of Things Journal, 6 (2): 1402-1409 (2019)Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing., and . Multimedia Tools Appl., 78 (4): 4267-4298 (2019)Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing., , and . IJESMA, 10 (3): 61-83 (2018)Efficient fingerprint matching on smart cards for high security and privacy in smart systems., , , and . Inf. Sci., (2019)Cooperative Mechanisms for Defending Distributed Denial of Service (DDoS) Attacks., and . Handbook of Computer Networks and Cyber Security, Springer, (2020)A novel approach to protect against phishing attacks at client side using auto-updated white-list., and . EURASIP J. Information Security, (2016)Petri net-based verification of security protocol implementation in software evolution., , and . IJES, 10 (6): 503-517 (2018)Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques., , , , and . Multimedia Tools Appl., 78 (4): 3961-3977 (2019)Efficient Compressed Ciphertext Length Scheme Using Multi-Authority CP-ABE for Hierarchical Attributes., , , and . IEEE Access, (2018)