Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Agent pattern recognition mechanism for detecting distributed denial of service attacks., and . IET Inf. Secur., 4 (4): 333-343 (2010)An analytical simulator for deploying IP telephony., , , and . Int. J. Netw. Manag., 19 (1): 25-37 (2009)Performance analysis of multi-core VMs hosting cloud SaaS applications., and . Comput. Stand. Interfaces, (2018)An Analytical Model for Estimating Cloud Resources of Elastic Services., , and . J. Netw. Syst. Manag., 24 (2): 285-308 (2016)A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT., , , , , and . CoRR, (2018)CoLocateMe: Aggregation-Based, Energy, Performance and Cost Aware VM Placement and Consolidation in Heterogeneous IaaS Clouds., , , , , and . IEEE Trans. Serv. Comput., 16 (2): 1023-1038 (March 2023)Blockchain for drug traceability: Architectures and open challenges., , , , and . Health Informatics J., 27 (2): 146045822110112 (2021)Blockchain-Based Management for Organ Donation and Transplantation., , , , , and . IEEE Access, (2022)Blockchain-Based Forward Supply Chain and Waste Management for COVID-19 Medical Equipment and Supplies., , , , , and . IEEE Access, (2021)Blockchain-Based Proof of Delivery of Physical Assets With Single and Multiple Transporters., and . IEEE Access, (2018)