Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

File Replication and Dereplication of Replica's in Distributed Environment., , and . IC3, volume 306 of Communications in Computer and Information Science, page 358-369. Springer, (2012)Authentication and Authorization Interface Using Security Service Level Agreements for Accessing Cloud Services., , and . IC3, volume 306 of Communications in Computer and Information Science, page 370-382. Springer, (2012)BLADE: Robust malware detection against obfuscation in android., , and . Digit. Investig., (2021)An Assistive Tool For Fileless Malware Detection., , , , and . WAC, page 21-25. IEEE, (2021)Data confidentiality and integrity preserving outsourcing algorithm for matrix chain multiplication over malicious cloud server., and . J. Intell. Fuzzy Syst., 34 (3): 1251-1263 (2018)Privacy preserving, verifiable and efficient outsourcing algorithm for regression analysis to a malicious cloud., , , and . J. Intell. Fuzzy Syst., 32 (5): 3413-3427 (2017)A new hybrid wrapper TLBO and SA with SVM approach for gene expression data., , and . Inf. Sci., (2019)A demand based fault tolerant file replication model for clouds., , , and . CUBE, page 561-566. ACM, (2012)Forensic Analysis of Fitness Applications on Android., , , , and . MobiSec, volume 1544 of Communications in Computer and Information Science, page 222-235. Springer, (2021)Load Balancing in Cluster Using BLCR Checkpoint/Restart., , , , and . ACITY (1), volume 176 of Advances in Intelligent Systems and Computing, page 729-737. Springer, (2012)