Search for persons
X
?
2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) ,
1
A Reinforcement Learning Approach for Attack Graph Analysis:
, In:
?
Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing ,
2
Glowworm swarm optimisation based task scheduling for cloud..:
, In:
?
Proceedings of the Fourth IEEE/ACM International Conference on Big Data Computing, Applications and Technologies ,
3
Glowworm Swarm Optimisation for Training Multi-Layer Percep..:
, In:
?
Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, Applications and Technologies ,
4
A big data analytics based approach to anomaly detection:
, In:
?
Proceedings of the 7th International Conference on Security of Information and Networks ,
5
Virtual Machine Introspection:
, In:
?
Proceedings of the 7th International Conference on Security of Information and Networks ,
6
Intrusion Detection System for Cloud Environment:
, In:
?
Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing ,
7
Virtualization Security Combining Mandatory Access Control ..:
, In:
?
Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing ,
8
Energy-Aware Virtual Machine Consolidation for Cloud Data C..:
, In:
?
E-Commerce Agents; Lecture Notes in Computer Science ,
9