Author:
Khan Suleman,Gani Abdullah,Wahab Ainuddin Wahid Abdul,Shiraz Muhammad,Ahmad Iftikhar
Funder
University of Malaya
High Impact Research
Malaysian Ministry of Higher Education
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference149 articles.
1. Privacy-preserving network forensics;Afanasyev;Commun. ACM,2011
2. Ahmed E, Khan, S., Yaqoob, I., Gani, A., Salim, F., 2013. Multi-objective optimization model for seamless application execution in mobile cloud computing. Information and Communication Technologies (ICICT). In: Procedings of the 5th International Conference on: IEEE, pp. 1–6
3. Secure and dependable software defined networks;Akhunzada;J. Netw. Comput. Appl.,2015
4. Akyuz, T., Sogukpinar, I., 2009. Packet marking with distance based probabilities for IP traceback. In: Proceedings of the NETCOM׳09, First International Conference on Networks and Communications, IEEE, pp. 433–438
5. Scalable Analysis of Attack Scenarios. Computer Security–ESORICS 2011;Albanese,2011
Cited by
85 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献