Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS)., , , and . Sensors, 23 (12): 5459 (2023)Dynamic Access Control In Iot: Monitoring User Behavior Using Smart Contracts., , , and . ECAI, page 1-6. IEEE, (2020)An Energy Efficient Trust Aware Opportunistic Routing Protocol for Wireless Sensor Network., , and . Int. J. Inf. Syst. Model. Des., 8 (2): 30-44 (2017)Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope., , , and . Comput. Commun., (2022)Vision and Audio-based Methods for First Impression Recognition Using Machine Learning Algorithms: A Review., , , and . Int. J. Artif. Intell. Tools, 32 (2): 2340010:1-2340010:48 (March 2023)Intrusion Detection System Model for IoT Networks Using Ensemble Learning., , , , and . J. Interconnect. Networks, 22 (3): 2145008:1-2145008:25 (2022)Reauthentication scheme for mobile wireless sensor networks., , and . Sustain. Comput. Informatics Syst., (2019)Securing wireless sensor networks from node clone attack: a lightweight message authentication algorithm., , and . Int. J. Inf. Comput. Secur., 12 (2/3): 217-233 (2020)Node authentication algorithm for securing static wireless sensor networks from node clone attack., and . Int. J. Inf. Comput. Secur., 10 (2/3): 129-148 (2018)Energy reduction in weakly hard real time systems., , and . RAIT, page 909-915. IEEE, (2012)