Author of the publication

Virtualization Techniques: Challenges and Opportunities.

, , , , and . MSPN, volume 10026 of Lecture Notes in Computer Science, page 49-62. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An outlier ensemble for unsupervised anomaly detection in honeypots data., , , and . Intell. Data Anal., 24 (4): 743-758 (2020)Modeling and improving named data networking over IEEE 802.15.4., , and . Ann. des Télécommunications, 76 (11-12): 839-850 (2021)Virtualization Techniques: Challenges and Opportunities., , , , and . MSPN, volume 10026 of Lecture Notes in Computer Science, page 49-62. Springer, (2016)Impact Analysis of Greedy Behavior Attacks in Vehicular Ad hoc Networks., , , , , , and . PEMWN, page 1-6. IEEE, (2021)Predicting Vehicles' Positions Using Roadside Units: A Machine-Learning Approach., , , and . CSCN, page 1-6. IEEE, (2018)Supervised Machine Learning for Matchmaking in Digital Business Ecosystems and Platforms., , , and . Inf. Syst. Frontiers, 26 (4): 1331-1343 (August 2024)Efficient and Lightweight Polynomial-Based Key Management Scheme for Dynamic Networks., , and . MSPN, volume 12605 of Lecture Notes in Computer Science, page 110-122. Springer, (2020)Parallel Applications Mapping onto Heterogeneous MPSoCs Interconnected Using Network on Chip., , and . MSPN, volume 12605 of Lecture Notes in Computer Science, page 123-143. Springer, (2020)CBUPRE to Secure MANETs from DoS Attacks., , and . MSPN, volume 9395 of Lecture Notes in Computer Science, page 163-175. Springer, (2015)Robust approach for host-overload detection based on dynamic safety parameter., , , and . FiCloud, page 266-271. IEEE, (2022)