From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

VM Profile Based Optimized Network Attack Pattern Detection Scheme for DDOS Attacks in Cloud., и . SSCC, том 377 из Communications in Computer and Information Science, стр. 255-261. Springer, (2013)Parallel Implementation of Part of Speech Tagging for Text Mining Using Grid Computing., , и . ACC (1), том 190 из Communications in Computer and Information Science, стр. 461-470. Springer, (2011)Efficient Variable Size Template Matching Using Fast Normalized Cross Correlation on Multicore Processors., , , , и . ADCONS, том 7135 из Lecture Notes in Computer Science, стр. 218-227. Springer, (2011)Implementing pattern-matching function definitions in CTDNet - a multiprocessor architecture., , , и . Microprocessing and Microprogramming, 28 (1-5): 151-155 (1990)A light weight centralized file monitoring approach for securing files in Cloud environment., , и . ICITST, стр. 382-387. IEEE, (2012)Application of Soft Computing on Localization in Wireless Sensor Networks., , , и . IC3, стр. 1-5. IEEE Computer Society, (2018)Fusion of Thermal Infrared and Visible Spectrum Video for Robust Surveillance., , и . ICVGIP, том 4338 из Lecture Notes in Computer Science, стр. 528-539. Springer, (2006)Profile and Back Off Based Distributed NIDS in Cloud., и . Wireless Personal Communications, 94 (4): 2879-2900 (2017)A desktop notification based scheme for preventing online frauds attempts to cloud users S|pp|S., и . ICACCI, стр. 255-260. IEEE, (2013)An Immediate System Call Sequence Based Approach for Detecting Malicious Program Executions in Cloud Environment., и . Wireless Personal Communications, 81 (1): 405-425 (2015)