Author of the publication

Cloud repository as a malicious service: challenge, identification and implication.

, , , , , , and . Cybersecurity, 1 (1): 14 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On event design in event-triggered feedback systems., and . Automatica, 47 (10): 2319-2322 (2011)Security, trust, and resilience of distributed networks and systems., , , and . Security and Communication Networks, 8 (10): 1829-1830 (2015)An efficient iterative method with order five for solving nonlinear systems., , , and . J. Comput. Meth. in Science and Engineering, 14 (6): 363-372 (2014)Optimal eighth-order Steffensen type methods for solving nonlinear equations., and . J. Comput. Meth. in Science and Engineering, 14 (4-5): 277-287 (2014)A robust approach to detect digital forgeries by exploring correlation patterns., , , and . Pattern Anal. Appl., 18 (2): 351-365 (2015)Mining hidden connections among biomedical concepts from disjoint biomedical literature sets through semantic-based association rule., , , , and . Int. J. Intell. Syst., 25 (2): 207-223 (2010)Efficient n-point iterative methods with memory for solving nonlinear equations., and . Numerical Algorithms, 70 (2): 357-375 (2015)Seventh-order derivative-free iterative method for solving nonlinear systems., , , and . Numerical Algorithms, 70 (3): 545-558 (2015)Abox Inference for Large Scale OWL-Lite Data., , , and . SKG, page 30. IEEE Computer Society, (2006)A Novel Multi-Layer Level Set Method for Image Segmentation., and . J. UCS, 14 (14): 2427-2452 (2008)