Author of the publication

Implementing the Required Degree of Multitenancy Isolation: A Case Study of Cloud-Hosted Bug Tracking System.

, , and . SCC, page 379-386. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Botnet Detection in the Internet of Things using Deep Learning Approaches., , and . IJCNN, page 1-8. IEEE, (2018)Evolutionary Computation for Optimal Component Deployment with Multitenancy Isolation in Cloud-hosted Applications., , and . INISTA, page 1-7. IEEE, (2018)Adaptive fault detection tool for real-time integrity monitoring of Subsea Control Systems., and . INISTA, page 21-26. IEEE, (2014)Evaluating Degrees of Multitenancy Isolation: A Case Study of Cloud-Hosted GSD Tools., , and . ICCAC, page 101-112. IEEE Computer Society, (2015)FedREVAN: Real-time DEtection of Vulnerable Android Source Code Through Federated Neural Network with XAI., , , , and . ESORICS Workshops (2), volume 14399 of Lecture Notes in Computer Science, page 426-441. Springer, (2023)Ensemble Common Features Technique for Lightweight Intrusion Detection in Industrial Control System., and . ICPS, page 1-6. IEEE, (2023)Multi-objective optimisation of cancer chemotherapy using smart PSO with decomposition., , and . MCDM, page 81-88. IEEE, (2011)Optimising cancer chemotherapy using an estimation of distribution algorithm and genetic algorithms., , and . GECCO, page 413-418. ACM, (2006)Reducing Computational Cost in IoT Cyber Security: Case Study of Artificial Immune System Algorithm., , , and . ICETE (2), page 523-528. SciTePress, (2019)Overlap-Based Undersampling for Improving Imbalanced Data Classification., , , and . IDEAL (1), volume 11314 of Lecture Notes in Computer Science, page 689-697. Springer, (2018)