Author of the publication

A Survey on Security Issues in Cloud Computing

, , , and . (2011)cite arxiv:1109.5388 Comment: The paper is communicated to the IEEE Communications Surveys and Tutorials.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An unsupervised learning-guided multi-node failure-recovery model for distributed graph processing systems., , and . J. Supercomput., 79 (9): 9383-9408 (June 2023)Optimizing mobile terminal equipment for video-medic services., , and . ACWR, page 373-378. ACM, (2011)An Addressing Scheme for Massive Sensor Networks., , and . CISIM, volume 11703 of Lecture Notes in Computer Science, page 481-492. Springer, (2019)Zero-shot Learning for Named Entity Recognition in Software Specification Documents., , , and . RE, page 100-110. IEEE, (2023)E2IRP: A New Energy Efficient Integrated Routing Protocol for MANET., , and . WiMo, volume 84 of Communications in Computer and Information Science, page 23-33. (2010)Shellmark: A Robust Software Watermarking Tool., , , and . COMAD/CODS, page 260-264. ACM, (2019)A Game-Based Approach for Mitigating the Sybil Attacks on Blockchain Applications., and . CISIM, volume 14164 of Lecture Notes in Computer Science, page 108-123. Springer, (2023)Byte Label Malware Classification Using Image Entropy., , and . ACSS (2), volume 883 of Advances in Intelligent Systems and Computing, page 17-29. Springer, (2018)A New Scale for Attribute Dependency in Large Database Systems., , , and . CISIM, volume 7564 of Lecture Notes in Computer Science, page 266-277. Springer, (2012)Event Ordering Using Graphical Notation for Event-B Models., , and . CISIM, volume 12133 of Lecture Notes in Computer Science, page 377-389. Springer, (2020)