Author of the publication

A Suggestion for Cloud Environments New Layer Contemplating and Its Security Factors.

, , , and . NBiS, page 573-577. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Network Data Abstraction Method for Data Set Verification., , , and . STA, volume 186 of Communications in Computer and Information Science, page 54-62. Springer, (2011)Low Power Approximate Multiplier Using Error Tolerant Adder., and . ISOCC, page 298-299. IEEE, (2020)Automated Immunization Against Denial-of-Service Attacks Featuring Stochastic Packet Inspection., , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 25-34. Springer, (2005)Visualization of network components for attack analysis., , , and . CICS, page 1-8. IEEE, (2009)Guest Editorial: Information and Communication Security in Multimedia Applications., and . Multimedia Tools Appl., 75 (22): 14503-14506 (2016)Compact Single-Ended Transceivers Demonstrating Flexible Generation of 1/N-Rate Receiver Front-Ends for Short-Reach Links., , , , , , , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 71 (1): 373-382 (January 2024)Smart seed selection-based effective black box fuzzing for IIoT protocol., , , and . J. Supercomput., 76 (12): 10140-10154 (2020)A Layout Generator of Latch, Flip-Flop, and Shift Register for High-Speed Links., , , , and . ISOCC, page 19-20. IEEE, (2022)A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model., , , , , and . WISA, volume 5379 of Lecture Notes in Computer Science, page 190-200. Springer, (2008)Power dissipation and area comparison of 512-bit and 1024-bit key AES., , , and . Comput. Math. Appl., 65 (9): 1378-1383 (2013)