18
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Detection of recurring vulnerabilities in computing services

, , , , &

References

  • Gaurav, A., Gupta, B. B., & Panigrahi, P. K. (2022). A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system. Enterprise Information Systems, 1-25.
  • Mirsadeghi, F., Rafsanjani, M. K., & Gupta, B. B. (2021). A trust infrastructure-based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Networking and Applications, 14(4), 2537-2553. doi: https://doi.org/10.1007/s12083-020-01010-4
  • Wang, C., Shen, J., Vijayakumar, P., & Gupta, B. B. (2021). Attribute-Based Secure Data Aggregation for Isolated IoT-Enabled Maritime Transportation Systems. IEEE Transactions on Intelligent Transportation Systems.
  • Tiwari, A., Sharma, R. M., & Garg, R. (2020). Emerging ontology formulation of optimized internet of things (IOT) services with cloud computing. Soft Computing: Theories and Applications.
  • Neil Davey, Paul Barson, Simon Field, and Ray J Frank. The development of a software clone detector. pages 1-18, London, UK, 1995.
  • Tiwari, A., & Sharma, R. M. (2018). Realm Towards Service Optimization in Fog Computing. In Proceedings of the International Journal of Fog Computing (IJFC)” IGI Global.
  • Cvitić, I., Peraković, D., Gupta, B., & Choo, K. K. R. (2021). Boosting-based DDoS Detection in Internet of Things Systems. IEEE Internet of Things Journal.
  • Tiwari, A., Sah, M. K., & Gupta, S. (2015). Efficient Service Utilization in Cloud Computing Exploitation Victimization as Revised Rough Set Optimization Service Parameters. Procedia Computer Science, 610-617.
  • John Krumm. A survey of computational location privacy. Personal Ubiquitous Computation, 13(6), August 2009.
  • Xiao Pan, Jianliang Xu, and Xiaofeng Meng. Protecting location privacy against location-dependent attacks in mobile services. IEEE Transactions on Knowledge and Data Engineering, 2012.
  • Kaur, M., Singh, D., Kumar, V., Gupta, B. B., & Abd El-Latif, A. A. (2021). Secure and Energy efficient based E-health Care Framework for Green Internet of Things. IEEE Transactions on Green Communications and Networking.
  • Bugra Gedik and Ling Liu. Location privacy in mobile systems: A personalized anonymization model 2005. IEEE Computer Society.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.