Folgen
Kazi Zunnurhain
Kazi Zunnurhain
Bestätigte E-Mail-Adresse bei kean.edu
Titel
Zitiert von
Zitiert von
Jahr
Security attacks and solutions in clouds
K Zunnurhain, S Vrbsky
Proceedings of the 1st international conference on cloud computing, 145-156, 2010
692010
Security in cloud computing
K Zunnurhain, SV Vrbsky
Proceedings of the 2011 International Conference on Security & Management, 2011
242011
Fapa: a model to prevent flooding attacks in clouds
K Zunnurhain
Proceedings of the 50th Annual Southeast Regional Conference, 395-396, 2012
162012
Delay analysis of wireless ad hoc networks: Single vs. multiple radio
AH Mohammad, X Hong, MA Islam, K Zunnurhain
IEEE Local Computer Network Conference, 814-820, 2010
142010
Vulnerabilities with Internet of Things
K Zunnurhain
Proceedings of the 2016 International Conference on Security and Management, 2016
102016
Google cloud platform security
NJ Mitchell, K Zunnurhain
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 319-322, 2019
82019
A new project management tool based on devsecops
K Zunnurhain, SR Duclervil
2019 International Conference on Computational Science and Computational …, 2019
62019
Vulnerability scanning with Google cloud platform
NJ Mitchell, K Zunnurhain
2019 International Conference on Computational Science and Computational …, 2019
62019
FAPA: flooding attack protection architecture in a cloud system
K Zunnurhain, SV Vrbsky, R Hasan
International Journal of Cloud Computing 3 (4), 379-401, 2014
62014
Determining the Penetration Threshold for an ASA 5500 Firewall
J Gill, K Zunnurhain
Proceedings of the SouthEast Conference, 149-153, 2017
22017
Always fresh: tracking food expiry with mobile app
K Zunnurhain, K Nayee, R Patel, P Patel
Journal of Computing Sciences in Colleges 35 (3), 223-223, 2019
12019
Enhancement of User Experience with Mobile App
K Zunnurhain, AJ Gonzalez
Workshop Proceedings of the 47th International Conference on Parallel …, 2018
12018
CS 643-860: Cloud Computing
K Zunnurhain
2024
CS 643: Cloud Computing
K Zunnurhain
2023
Investigation of Vulnerabilities with Monitoring Tools
K Zunnurhain, AJ Patel, M James
Proceedings of the International Conference on Security and Management (SAM …, 2018
2018
A Vision for Intrusion Analysis and Digital Forensics in Cloud
K Zunnurhain
Proceedings of the International Conference on Security and Management (SAM …, 2016
2016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–16