Author of the publication

Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT.

, , , and . ANTS, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Heuristic Model for Performing Digital Forensics in Cloud Computing Environment., and . SSCC, volume 467 of Communications in Computer and Information Science, page 341-352. Springer, (2014)Design and Implementation of a forensic framework for Cloud in OpenStack cloud platform., and . ICACCI, page 645-650. IEEE, (2014)A Cross - Domain Role Mapping and Authorization Framework for RBAC in Grid Systems., , and . IJCSA, 6 (1): 1-12 (2009)Event correlation in cloud: a forensic perspective., and . Computing, 98 (11): 1203-1224 (2016)Analysis of Semantic Attacks in Online Social Networks., and . SNDS, volume 420 of Communications in Computer and Information Science, page 45-56. Springer, (2014)Efficient Framework for Detection of Version Number Attack in Internet of Things., , , and . ISDA (2), volume 941 of Advances in Intelligent Systems and Computing, page 480-492. Springer, (2018)Dynamic Delegation Approach for Access Control in Grids., , and . e-Science, page 387-394. IEEE Computer Society, (2005)Temporal Dynamics and Spatial Content in IoT Malware detection., and . TENCON, page 1590-1595. IEEE, (2019)Analysis and modelling of semantic attacks in online social networks., and . IJTMCC, 2 (3): 207-228 (2014)Privacy landscape in online social networks., and . IJTMCC, 3 (1): 19-39 (2015)