Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Cloud Computing Governance Framework., and . CLOSER, page 671-678. SciTePress, (2014)Towards Cloud Customers Self-Monitoring and Availability-Monitoring., and . Bio-inspiring Cyber Security and Cloud Services, volume 70 of Intelligent Systems Reference Library, Springer, (2014)New Governance Framework to Secure Cloud Computing., and . CLOSER (Selected Papers), volume 512 of Communications in Computer and Information Science, page 187-199. Springer, (2014)Cloud computing security: challenges and future trends., , and . Int. J. Comput. Appl. Technol., 55 (2): 158-172 (2017)A Comprehensive Survey on Vehicular Ad Hoc Networks (VANET)., and . AMLTA, volume 1339 of Advances in Intelligent Systems and Computing, page 736-749. Springer, (2021)Evaluation of Software Static Analyzers., and . ICSIE, page 11-17. ACM, (2020)Cluster Head election in Wireless Sensor Networks., , and . IAS, page 1-5. IEEE, (2014)Behaviorally-Based Textual Similarity Engine for Matching Job-Seekers with Jobs., and . AMLTA, volume 723 of Advances in Intelligent Systems and Computing, page 564-574. Springer, (2018)Hybrid Information Filtering Engine for Personalized Job Recommender System., and . AMLTA, volume 723 of Advances in Intelligent Systems and Computing, page 553-563. Springer, (2018)A Holistic Approach to Ransomware Classification: Leveraging Static and Dynamic Analysis with Visualization., , , , and . Inf., 15 (1): 46 (2024)