Author of the publication

Secure Private Cloud Architecture for Mobile Infrastructure as a Service.

, , , and . SERVICES, page 149-154. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VM Profile Based Optimized Network Attack Pattern Detection Scheme for DDOS Attacks in Cloud., and . SSCC, volume 377 of Communications in Computer and Information Science, page 255-261. Springer, (2013)Collaborative teaching in large classes of computer science courses., , , , , , , , and . IC3, page 397-403. IEEE Computer Society, (2015)Secure Private Cloud Architecture for Mobile Infrastructure as a Service., , , and . SERVICES, page 149-154. IEEE Computer Society, (2012)A light weight centralized file monitoring approach for securing files in Cloud environment., , and . ICITST, page 382-387. IEEE, (2012)Ontology Based Information Retrieval for Learning Styles of Autistic People., and . HPAGC, volume 169 of Communications in Computer and Information Science, page 293-298. Springer, (2011)A Hybrid Intrusion Detection Architecture for Defense against DDoS Attacks in Cloud Environment., , and . IC3, volume 306 of Communications in Computer and Information Science, page 498-499. Springer, (2012)System cum Program-Wide Lightweight Malicious Program Execution Detection Scheme for Cloud., and . Inf. Secur. J. A Glob. Perspect., 23 (3): 86-99 (2014)A secure and lightweight approach for critical data security in cloud., , , and . CASoN, page 315-320. IEEE, (2012)A fingerprinting system calls approach for intrusion detection in a cloud environment., , , and . CASoN, page 309-314. IEEE, (2012)Profile and Back Off Based Distributed NIDS in Cloud., and . Wireless Personal Communications, 94 (4): 2879-2900 (2017)