Author of the publication

A fingerprinting system calls approach for intrusion detection in a cloud environment.

, , , and . CASoN, page 309-314. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Variable Size Template Matching Using Fast Normalized Cross Correlation on Multicore Processors., , , , and . ADCONS, volume 7135 of Lecture Notes in Computer Science, page 218-227. Springer, (2011)Parallel Implementation of Part of Speech Tagging for Text Mining Using Grid Computing., , and . ACC (1), volume 190 of Communications in Computer and Information Science, page 461-470. Springer, (2011)VM Profile Based Optimized Network Attack Pattern Detection Scheme for DDOS Attacks in Cloud., and . SSCC, volume 377 of Communications in Computer and Information Science, page 255-261. Springer, (2013)Implementing pattern-matching function definitions in CTDNet - a multiprocessor architecture., , , and . Microprocessing and Microprogramming, 28 (1-5): 151-155 (1990)Profile and Back Off Based Distributed NIDS in Cloud., and . Wireless Personal Communications, 94 (4): 2879-2900 (2017)An Immediate System Call Sequence Based Approach for Detecting Malicious Program Executions in Cloud Environment., and . Wireless Personal Communications, 81 (1): 405-425 (2015)A desktop notification based scheme for preventing online frauds attempts to cloud users S|pp|S., and . ICACCI, page 255-260. IEEE, (2013)A new localization using single mobile anchor and mesh-based path planning models., , and . Wirel. Networks, 25 (5): 2919-2929 (2019)Application of Soft Computing on Localization in Wireless Sensor Networks., , , and . IC3, page 1-5. IEEE Computer Society, (2018)A light weight centralized file monitoring approach for securing files in Cloud environment., , and . ICITST, page 382-387. IEEE, (2012)