Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CHACT: Convex Hull Enabled Active Contour Technique for Salient Object Detection., , and . IEEE Access, (2018)VAED: VMI-assisted evasion detection approach for infrastructure as a service cloud., , , and . Concurrency and Computation: Practice and Experience, (2017)A Framework for Network Forensic Analysis., , and . ICT, volume 101 of Communications in Computer and Information Science, page 142-147. Springer, (2010)Energy-efficient fuzzy-based approach for dynamic virtual machine consolidation., , , , and . IJGUC, 10 (4): 308-325 (2019)Task Clustering-Based Energy-Aware Workflow Scheduling in Cloud Environment., , , , and . HPCC/SmartCity/DSS, page 968-973. IEEE, (2018)A Secure Hybrid Cloud Enabled architecture for Internet of Things., , , , , and . WF-IoT, page 274-279. (2015)LevelSync: A hierarchical time synchronization mechanism for wireless sensor networks., , , and . IC3, page 276-282. IEEE Computer Society, (2014)A Holistic Forensic Model for the Internet of Things., , and . IFIP Int. Conf. Digital Forensics, volume 569 of IFIP Advances in Information and Communication Technology, page 3-18. Springer, (2019)Intrusion detection techniques in cloud environment: A survey., , , and . J. Network and Computer Applications, (2017)NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment., , , and . ICACCI, page 56-62. IEEE, (2016)