Author:
Ibrahim Amani S.,Hamlyn-Harris James,Grundy John,Almorsy Mohamed
Cited by
42 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Exploring Virtual Machine Scheduling Algorithms: A Meta-Analysis;Sir Syed University Research Journal of Engineering & Technology;2023-06-28
2. Traffic Monitoring Related Experimental Study for a Software-Defined Network Based Virtualized Security Functions Platform;2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON);2021-12-01
3. An Real Time Cloud Security System and Issues comparison using Machine and Deep Learning;2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC);2021-11-11
4. RV-TEE: secure cryptographic protocol execution based on runtime verification;Journal of Computer Virology and Hacking Techniques;2021-07-05
5. ProSAS: Proactive Security Auditing System for Clouds;IEEE Transactions on Dependable and Secure Computing;2021