Author of the publication

Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion Detection.

, , and . HPCC/EUC, page 175-182. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of Multi-partition Paralleled Image Storage Hardware File System for MARS Rover., , , , and . WISATS (1), volume 280 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 371-379. Springer, (2019)Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion Detection., , and . HPCC/EUC, page 175-182. IEEE, (2013)Toward supervised shape-based behavioral authentication on smartphones., , , and . J. Inf. Secur. Appl., (2020)Blockchain-Enhanced Fair Task Scheduling for Cloud-Fog-Edge Coordination Environments: Model and Algorithm., , , , and . Secur. Commun. Networks, (2021)Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments., , and . IEEE Trans. Netw. Serv. Manag., 14 (1): 233-245 (2017)A weak Galerkin finite element method for 1D semiconductor device simulation models., , , and . J. Comput. Appl. Math., (March 2024)Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments., , and . J. Netw. Comput. Appl., (2020)Group Cognition as Multimodal Discourse., and . CSCL (2), page 77-80. International Society of the Learning Sciences, LuLu, Amazon, (2013)PassGrid: Towards Graph-Supplemented Textual Shoulder Surfing Resistant Authentication., , , , and . SocialSec, volume 1095 of Communications in Computer and Information Science, page 251-263. Springer, (2019)ZoomPass: A Zoom-Based Android Unlock Scheme on Smart Devices., , , and . SciSec, volume 13580 of Lecture Notes in Computer Science, page 245-259. Springer, (2022)