Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Klm-PPSA: Klm-based profiling and preventing security attacks for cloud environments: Invited Paper., , , , and . WINCOM, page 1-7. IEEE, (2019)Klm-based Profiling and Preventing Security Attacks for Cloud Computing: A Comparative Study., , , , and . ICT, page 1-6. IEEE, (2021)RCAR Framework: Building a Regularized Class Association Rules Model in a Categorical Data Space., and . SITA, page 1:1-1:6. ACM, (2020)A Literature Review on Attacks Prevention and Profiling in Cloud Computing., , , , , and . ANT/EDI40, volume 220 of Procedia Computer Science, page 970-977. Elsevier, (2023)PPSA: Profiling and Preventing Security Attacks in Cloud Computing., , , , and . IWCMC, page 415-421. IEEE, (2019)Evaluating Different TiO2 Nanoflower-Based Composites for Humidity Detection., , , , , , , , and . Sensors, 22 (15): 5794 (2022)Towards an interpretable Rules Ensemble algorithm for classification in a categorical data space., and . SITA, page 1-6. IEEE, (2015)Toward an exhaustive review on Machine Learning for Cybersecurity., , , and . FNC/MobiSPC/SEIT, volume 203 of Procedia Computer Science, page 583-587. Elsevier, (2022)Finding disjoint clusters in a categorical data space., and . SITA, page 43:1-43:5. ACM, (2018)Class-association rules pruning using regularization., and . AICCSA, page 1-7. IEEE Computer Society, (2016)