Author of the publication

Surveying and Analyzing Urban Environment Approaches of Air Quality Monitoring.

, , , and . MSPN, volume 11005 of Lecture Notes in Computer Science, page 1-12. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Ciphertext Policy Attribute Based Encryption Model: A Revocable Access Control Solution in Cloud Computing., , and . CRiSIS, volume 12026 of Lecture Notes in Computer Science, page 193-207. Springer, (2019)FFED: a novel strategy based on fast entropy to detect attacks against trust computing in cloud., , , and . Clust. Comput., 24 (3): 1945-1954 (2021)A Novel QoS-Aware Method Based on Resource Control and Management in NGN Networks., and . PDP, page 288-291. IEEE Computer Society, (2014)Dual Revocation: Attribute and User Revocation Based On CPABE In Cloud Computing., , and . WiMob, page 1-6. IEEE, (2019)Private Security for the Cloud Mobile via a Strong Authentication Method., , , and . CDVE, volume 11792 of Lecture Notes in Computer Science, page 190-200. Springer, (2019)Satisfying QoS requirements in NGN networks using an optimized resource control and management method., and . NTMS, page 1-5. IEEE, (2015)Satisfying QoS Requirements in NGN Networks Using a Dynamic Adaptive Queuing Delay Control Method., and . FNC/MobiSPC, volume 56 of Procedia Computer Science, page 225-232. Elsevier, (2015)Surveying and Analyzing Urban Environment Approaches of Air Quality Monitoring., , , and . MSPN, volume 11005 of Lecture Notes in Computer Science, page 1-12. Springer, (2018)End to End Cloud Computing Architecture Based on A Novel Classification of Security Issues., , , and . AICCSA, page 303-310. IEEE Computer Society, (2017)An Improved Model for Enhancing Cloud Security Through Hybrid Optimization of Intrusion Detection., , , and . CDVE, volume 15158 of Lecture Notes in Computer Science, page 278-288. Springer, (2024)