Author of the publication

A Secure Hybrid Cloud Enabled architecture for Internet of Things.

, , , , , and . WF-IoT, page 274-279. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Finding Similarity in Time Series Data by Method of Time Weighted Moments., and . ADC, volume 39 of CRPIT, page 155-164. Australian Computer Society, (2005)Network Forensic Analysis by Correlation of Attacks with Network Attributes., , and . ICT, volume 101 of Communications in Computer and Information Science, page 124-128. Springer, (2010)Missing Value Imputation Based on K-Mean Clustering with Weighted Distance., , and . IC3 (1), volume 94 of Communications in Computer and Information Science, page 600-609. Springer, (2010)Parallel Misuse and Anomaly Detection Model., , and . Int. J. Netw. Secur., 14 (4): 211-222 (2012)Low Overhead Optimal Checkpointing for Mobile Distributed Systems., , and . ICDE, page 686-688. IEEE Computer Society, (2003)Ant colony based rule generation for reusable software component retrieval., , and . ISEC, page 129-130. ACM, (2008)Classification of Phylogenetic Profiles for Protein Function Prediction: An SVM Approach., and . IC3, volume 40 of Communications in Computer and Information Science, page 510-520. Springer, (2009)Fault Tolerant Double Tree Multistage Interconnection Network., , , and . INFOCOM, page 462-468. IEEE Computer Society, (1991)Message-Task Scheduling in Object-Oriented Heterogeneous GURU Distributed DBMS., , and . ICPP (3), page 235-242. CRC Press, (1994)E-CAP: An Extended Capability Based Mechanism to Limit Distributed Denial of Service Attacks., , , , and . ICETET, page 1244-1249. IEEE Computer Society, (2008)