Author of the publication

A fingerprinting system calls approach for intrusion detection in a cloud environment.

, , , and . CASoN, page 309-314. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rule-based Expert Systems, and . (0000)A hybrid framework for supporting scheduling in extended manufacturing environments., , , , and . HIS, page 213-218. IEEE, (2014)Using imperialist competition algorithm for independent task scheduling in grid computing., , , and . J. Intell. Fuzzy Syst., 27 (1): 187-199 (2014)Improved differential evolution algorithm with decentralisation of population., , and . Int. J. Bio Inspired Comput., 3 (1): 17-30 (2011)Human Perception-based Color Image Segmentation Using Comprehensive Learning Particle Swarm Optimization., , , , and . J. Inf. Hiding Multim. Signal Process., 2 (3): 227-235 (2011)A bibliometric analysis and cutting-edge overview on fuzzy techniques in Big Data., , and . Eng. Appl. Artif. Intell., (2020)Novel Square Error Minimization-Based Multilevel Thresholding Method for COVID-19 X-Ray Image Analysis Using Fast Cuckoo Search., , , and . Int. J. Image Graph., 24 (1): 2450004:1-2450004:26 (January 2024)On convergence of the multi-objective particle swarm optimizers., , , and . Inf. Sci., 181 (8): 1411-1425 (2011)A Combinational Data Prediction Model for Data Transmission Reduction in Wireless Sensor Networks., , and . IEEE Access, (2022)A novel approach for comparing web sites by using MicroGenres., , , , , and . Eng. Appl. Artif. Intell., (2014)