Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting and Containing Malicious Services in an Intercloud Environment., , and . J. Web Eng., 15 (5&6): 521-538 (2016)Nongray Models for Radiative Absorption and Anisotropic Scattering by Water Droplets in Fire CFD Simulations, , , , , and . Fire Safety Journal, (2020)A Containment-Based Security Model for Cycle-Stealing P2P Applications., and . Inf. Secur. J. A Glob. Perspect., 19 (4): 191-203 (2010)2D MoS2/glassy carbon based electrochemical sensor for pico-molar detection of hydrogen peroxide and hypochlorous acid., , , and . IEEE SENSORS, page 1-3. IEEE, (2016)Detection of Liver Disease Using Machine Learning Approach., , , , and . IC3I, page 1824-1829. IEEE, (2022)Peer Enterprises: Possibilities, Challenges and Some Ideas Towards Their Realization., and . OTM Workshops (2), volume 4806 of Lecture Notes in Computer Science, page 1011-1020. Springer, (2007)C2C (Cloud-to-Cloud): An Ecosystem of Cloud Service Providers for Dynamic Resource Provisioning., , and . ACC (1), volume 190 of Communications in Computer and Information Science, page 501-510. Springer, (2011)Secure Thyself: Securing Individual Peers in Collaborative Peer-to-Peer Environments., and . GCA, page 140-146. CSREA Press, (2008)Automatic identification of informal social groups and places for geo&\#45;social recommendations, , , and . Int. J. Mob. Netw. Des. Innov., 2 (3/4): 159--171 (2007)IoT Framework in a Blockchain dependent Cloud Environment., , , , , and . ICCCNT, page 1-6. IEEE, (2023)