Author of the publication

A light weight centralized file monitoring approach for securing files in Cloud environment.

, , and . ICITST, page 382-387. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel Implementation of Part of Speech Tagging for Text Mining Using Grid Computing., , and . ACC (1), volume 190 of Communications in Computer and Information Science, page 461-470. Springer, (2011)VM Profile Based Optimized Network Attack Pattern Detection Scheme for DDOS Attacks in Cloud., and . SSCC, volume 377 of Communications in Computer and Information Science, page 255-261. Springer, (2013)Efficient Variable Size Template Matching Using Fast Normalized Cross Correlation on Multicore Processors., , , , and . ADCONS, volume 7135 of Lecture Notes in Computer Science, page 218-227. Springer, (2011)Implementing pattern-matching function definitions in CTDNet - a multiprocessor architecture., , , and . Microprocessing and Microprogramming, 28 (1-5): 151-155 (1990)A new localization using single mobile anchor and mesh-based path planning models., , and . Wireless Networks, 25 (5): 2919-2929 (2019)An Immediate System Call Sequence Based Approach for Detecting Malicious Program Executions in Cloud Environment., and . Wireless Personal Communications, 81 (1): 405-425 (2015)Profile and Back Off Based Distributed NIDS in Cloud., and . Wireless Personal Communications, 94 (4): 2879-2900 (2017)A desktop notification based scheme for preventing online frauds attempts to cloud users S|pp|S., and . ICACCI, page 255-260. IEEE, (2013)Application of Soft Computing on Localization in Wireless Sensor Networks., , , and . IC3, page 1-5. IEEE Computer Society, (2018)Fusion of Thermal Infrared and Visible Spectrum Video for Robust Surveillance., , and . ICVGIP, volume 4338 of Lecture Notes in Computer Science, page 528-539. Springer, (2006)