Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quality of service aware cloud resource provisioning for social multimedia services and applications., , , , , and . Multim. Tools Appl., 76 (12): 14485-14509 (2017)User profiling for big social media data using standing ovation model., , , , , and . Multim. Tools Appl., 77 (9): 11179-11201 (2018)Service level agreement management framework for utility-oriented computing platforms., , , and . J. Supercomput., 71 (11): 4287-4303 (2015)Quality of Service Aware Reliable Task Scheduling in Vehicular Cloud Computing., , , , , and . Mob. Networks Appl., 21 (3): 482-493 (2016)Privacy-Preserved, Provable Secure, Mutually Authenticated Key Agreement Protocol for Healthcare in a Smart City Environment., , , and . IEEE Access, (2019)CredFinder: A real-time tweets credibility assessing system., , , , and . ASONAM, page 1406-1409. IEEE Computer Society, (2016)Human Activity Recognition from Body Sensor Data using Deep Learning., , , , and . J. Medical Syst., 42 (6): 99:1-99:8 (2018)An efficient key agreement protocol for Sybil-precaution in online social networks., , , , , , , and . Future Gener. Comput. Syst., (2018)Online Extremism Detection in Textual Content: A Systematic Literature Review., , , , and . IEEE Access, (2021)A prediction system of Sybil attack in social network using deep-regression model., , , , and . Future Gener. Comput. Syst., (2018)