Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Finite Context Intrusion Prediction Model for Cloud Systems with a Probabilistic Suffix Tree., , , , and . EMS, page 526-531. IEEE, (2014)A Smart Network Slicing Provisioning Framework for 5G-based IoT Networks.. IOTSMS, page 104-110. IEEE, (2023)Toward An Experimental Federated 6G Testbed: A Federated Leaning Approach., and . AICCSA, page 1-6. IEEE, (2022)CIDD: A Cloud Intrusion Detection Dataset for Cloud Computing and Masquerade Attacks., and . ITNG, page 397-402. IEEE Computer Society, (2012)CIDS: A Framework for Intrusion Detection in Cloud Systems., and . ITNG, page 379-385. IEEE Computer Society, (2012)Secured Cluster-Based Electricity Theft Detectors Against Blackbox Evasion Attacks., , , , , , and . CCNC, page 333-338. IEEE, (2024)Clustering and Ensemble Based Approach for Securing Electricity Theft Detectors Against Evasion Attacks., , , , , and . IEEE Access, (2023)ICSD: Integrated Cloud Services Dataset., , and . SERVICES, volume 10975 of Lecture Notes in Computer Science, page 18-30. Springer, (2018)QoS Optimization for Cloud Service Composition Based on Economic Model., , , , and . IoT360 (1), volume 150 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 355-366. Springer, (2014)HA-CIDS: A Hierarchical and Autonomous IDS for Cloud Systems., , , and . CICSyN, page 179-184. IEEE, (2013)