Security attacks and solutions in clouds K Zunnurhain, S Vrbsky Proceedings of the 1st international conference on cloud computing, 145-156, 2010 | 69 | 2010 |
Security in cloud computing K Zunnurhain, SV Vrbsky Proceedings of the 2011 International Conference on Security & Management, 2011 | 24 | 2011 |
Fapa: a model to prevent flooding attacks in clouds K Zunnurhain Proceedings of the 50th Annual Southeast Regional Conference, 395-396, 2012 | 16 | 2012 |
Delay analysis of wireless ad hoc networks: Single vs. multiple radio AH Mohammad, X Hong, MA Islam, K Zunnurhain IEEE Local Computer Network Conference, 814-820, 2010 | 14 | 2010 |
Vulnerabilities with Internet of Things K Zunnurhain Proceedings of the 2016 International Conference on Security and Management, 2016 | 10 | 2016 |
Google cloud platform security NJ Mitchell, K Zunnurhain Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 319-322, 2019 | 8 | 2019 |
A new project management tool based on devsecops K Zunnurhain, SR Duclervil 2019 International Conference on Computational Science and Computational …, 2019 | 6 | 2019 |
Vulnerability scanning with Google cloud platform NJ Mitchell, K Zunnurhain 2019 International Conference on Computational Science and Computational …, 2019 | 6 | 2019 |
FAPA: flooding attack protection architecture in a cloud system K Zunnurhain, SV Vrbsky, R Hasan International Journal of Cloud Computing 3 (4), 379-401, 2014 | 6 | 2014 |
Determining the Penetration Threshold for an ASA 5500 Firewall J Gill, K Zunnurhain Proceedings of the SouthEast Conference, 149-153, 2017 | 2 | 2017 |
Always fresh: tracking food expiry with mobile app K Zunnurhain, K Nayee, R Patel, P Patel Journal of Computing Sciences in Colleges 35 (3), 223-223, 2019 | 1 | 2019 |
Enhancement of User Experience with Mobile App K Zunnurhain, AJ Gonzalez Workshop Proceedings of the 47th International Conference on Parallel …, 2018 | 1 | 2018 |
CS 643-860: Cloud Computing K Zunnurhain | | 2024 |
CS 643: Cloud Computing K Zunnurhain | | 2023 |
Investigation of Vulnerabilities with Monitoring Tools K Zunnurhain, AJ Patel, M James Proceedings of the International Conference on Security and Management (SAM …, 2018 | | 2018 |
A Vision for Intrusion Analysis and Digital Forensics in Cloud K Zunnurhain Proceedings of the International Conference on Security and Management (SAM …, 2016 | | 2016 |