Author of the publication

Clouds selection for network appliances based on trust credibility.

, , and . ITNAC, page 302-307. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Level Virtual Ring: Cross-Level Name Routing with Embedded Identifier in Sensor Network., and . ICWN, page 67-74. CSREA Press, (2009)Designing a Secure Blockchain-Based Supply Chain Management Framework., , , , and . J. Comput. Inf. Syst., 63 (3): 592-607 (May 2023)Variational auto-encoder based Bayesian Poisson tensor factorization for sparse and imbalanced count data., , , , , , and . Data Min. Knowl. Discov., 35 (2): 505-532 (2021)SolcTrans: Towards machine translation of Solidity smart contract source code., , , , and . CoRR, (2021)Detecting false data attacks using machine learning techniques in smart grid: A survey., , , , and . J. Netw. Comput. Appl., (2020)A Fast and Scalable Authentication Scheme in IoT for Smart Living., , , , , , and . CoRR, (2020)Semi-supervised Continual Learning with Meta Self-training., , , , , and . CIKM, page 4024-4028. ACM, (2022)A Blockchain-Based Cooperative Perception in Internet of Vehicles., , , , , and . VTC Fall, page 1-6. IEEE, (2021)GAN-DP: Generative Adversarial Net Driven Differentially Privacy-Preserving Big Data Publishing., , , , , and . ICC, page 1-6. IEEE, (2019)Reliable Customized Privacy-Preserving in Fog Computing., , , , , and . ICC, page 1-6. IEEE, (2020)