Author of the publication

Towards an offloading approach that augments multi-persona performance and viability.

, , , and . CCNC, page 455-460. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An anomaly detection system based on variable N-gram features and one-class SVM., , , and . Inf. Softw. Technol., (2017)Independent and Identically Distributed (IID) Data Assessment in Federated Learning., , , , , and . GLOBECOM, page 293-298. IEEE, (2022)P-Code Based Classification to Detect Malicious VBA Macro., and . ISNCC, page 1-6. IEEE, (2020)Attribute-Based Encryption for Preserving Smart Home Data Privacy., , , and . ICOST, volume 10461 of Lecture Notes in Computer Science, page 185-197. Springer, (2017)The Use of Anomaly Detection for the Detection of Different Types of DDoS Attacks in Cloud Environment., , , , and . J. Hardw. Syst. Secur., 5 (3): 208-222 (2021)An Evaluation of Machine Learning Algorithms in an Experimental Structural Health Monitoring System Incorporating LoRa IoT Connectivity., , , , and . I2MTC, page 1-6. IEEE, (2022)Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption., , , and . MILCOM, page 49-54. IEEE, (2022)A dynamic compiler for embedded Java virtual machines., , , , , , and . PPPJ, volume 91 of ACM International Conference Proceeding Series, page 100-106. ACM, (2004)Common Criteria Approach to J2ME CLDC Security Requirements., , , and . SoMeT, volume 147 of Frontiers in Artificial Intelligence and Applications, page 177-194. IOS Press, (2006)SQLIIDaaS: A SQL Injection Intrusion Detection Framework as a Service for SaaS Providers., , , and . CSCloud, page 163-170. IEEE Computer Society, (2017)