Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VM Profile Based Optimized Network Attack Pattern Detection Scheme for DDOS Attacks in Cloud., and . SSCC, volume 377 of Communications in Computer and Information Science, page 255-261. Springer, (2013)A light weight centralized file monitoring approach for securing files in Cloud environment., , and . ICITST, page 382-387. IEEE, (2012)Ontology Based Information Retrieval for Learning Styles of Autistic People., and . HPAGC, volume 169 of Communications in Computer and Information Science, page 293-298. Springer, (2011)Collaborative teaching in large classes of computer science courses., , , , , , , , and . IC3, page 397-403. IEEE Computer Society, (2015)Secure Private Cloud Architecture for Mobile Infrastructure as a Service., , , and . SERVICES, page 149-154. IEEE Computer Society, (2012)A Hybrid Intrusion Detection Architecture for Defense against DDoS Attacks in Cloud Environment., , and . IC3, volume 306 of Communications in Computer and Information Science, page 498-499. Springer, (2012)System cum Program-Wide Lightweight Malicious Program Execution Detection Scheme for Cloud., and . Inf. Secur. J. A Glob. Perspect., 23 (3): 86-99 (2014)A secure and lightweight approach for critical data security in cloud., , , and . CASoN, page 315-320. IEEE, (2012)A fingerprinting system calls approach for intrusion detection in a cloud environment., , , and . CASoN, page 309-314. IEEE, (2012)An Immediate System Call Sequence Based Approach for Detecting Malicious Program Executions in Cloud Environment., and . Wireless Personal Communications, 81 (1): 405-425 (2015)