Author of the publication

System cum Program-Wide Lightweight Malicious Program Execution Detection Scheme for Cloud.

, and . Inf. Secur. J. A Glob. Perspect., 23 (3): 86-99 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VM Profile Based Optimized Network Attack Pattern Detection Scheme for DDOS Attacks in Cloud., and . SSCC, volume 377 of Communications in Computer and Information Science, page 255-261. Springer, (2013)Parallel Implementation of Part of Speech Tagging for Text Mining Using Grid Computing., , and . ACC (1), volume 190 of Communications in Computer and Information Science, page 461-470. Springer, (2011)Efficient Variable Size Template Matching Using Fast Normalized Cross Correlation on Multicore Processors., , , , and . ADCONS, volume 7135 of Lecture Notes in Computer Science, page 218-227. Springer, (2011)Implementing pattern-matching function definitions in CTDNet - a multiprocessor architecture., , , and . Microprocessing and Microprogramming, 28 (1-5): 151-155 (1990)An Immediate System Call Sequence Based Approach for Detecting Malicious Program Executions in Cloud Environment., and . Wireless Personal Communications, 81 (1): 405-425 (2015)A new localization using single mobile anchor and mesh-based path planning models., , and . Wireless Networks, 25 (5): 2919-2929 (2019)A desktop notification based scheme for preventing online frauds attempts to cloud users S|pp|S., and . ICACCI, page 255-260. IEEE, (2013)Profile and Back Off Based Distributed NIDS in Cloud., and . Wireless Personal Communications, 94 (4): 2879-2900 (2017)Application of Soft Computing on Localization in Wireless Sensor Networks., , , and . IC3, page 1-5. IEEE Computer Society, (2018)Fusion of Thermal Infrared and Visible Spectrum Video for Robust Surveillance., , and . ICVGIP, volume 4338 of Lecture Notes in Computer Science, page 528-539. Springer, (2006)