Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Farroha, Bassam
add a person with the name Farroha, Bassam
 

Other publications of authors with the same name

An agile enabler framework: Architecting services in the clouds., and . MILCOM, page 1-6. IEEE, (2012)Examining the technologies and processes for key management in the enterprise and the way forward into the virtualized environment., , and . MILCOM, page 1454-1459. IEEE, (2011)Developing corporate services in an agile environment., and . MILCOM, page 1535-1540. IEEE, (2011)The trust engineering framework: Architecting native security to defend against the next generation threats., and . MILCOM, page 1-6. IEEE, (2012)Architecting dynamic cyber defense for a secure multi-tenant cloud services environment., and . MILCOM, page 1-6. IEEE, (2012)Architecting the Next Generation Computing Platform to Deliver Protected Differentiated Services., and . SysCon, page 1-8. IEEE, (2019)Denial of Sleep attacks in Bluetooth Low Energy wireless sensor networks., , and . MILCOM, page 1231-1236. IEEE, (2016)An adaptive SoS framework for integrating dynamic cyber defense., and . MILCOM, page 1-6. IEEE, (2012)An investigative analysis into security in the clouds and the impact of virtualization on the security architecture., and . MILCOM, page 1369-1374. IEEE, (2011)Analyzing the Architecture Advantages and Vulnerabilities in Heterogeneous 5G Wireless Networks., , and . SysCon, page 1-8. IEEE, (2019)