Author of the publication

BENIGREEN: Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT.

, , , , , and . IEEE Internet Things J., 10 (18): 16480-16493 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proof-of-Work Consensus Approach in Blockchain Technology for Cloud and Fog Computing Using Maximization-Factorization Statistics., , , , and . IEEE Internet of Things Journal, 6 (4): 6835-6842 (2019)Adaptive Intrusion Detection in Edge Computing Using Cerebellar Model Articulation Controller and Spline Fit., , , , , and . IEEE Trans. Serv. Comput., 16 (2): 900-912 (March 2023)Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey., , , , and . IEEE Access, (2022)Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN., , , and . Int. J. Inf. Secur. Priv., 12 (1): 53-62 (2018)A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges., , , , and . IEEE Access, (2021)A Lightweight Signcryption Method for Perception Layer in Internet-of-Things., , , and . J. Inf. Secur. Appl., (2020)The Use of Artificial-Intelligence-Based Ensembles for Intrusion Detection: A Review., and . Appl. Comput. Intell. Soft Comput., (2012)A deep learning-based intrusion detection system for in-vehicle networks., and . Comput. Electr. Eng., 104 (Part): 108447 (2022)Classification of Sleep-Wake State in Ballistocardiogram system based on Deep Learning., , , , , , and . EMBC, page 1944-1947. IEEE, (2022)Adaptive classifier-based intrusion detection system using logistic regression and Euclidean distance on network probe vectors in resource constrained networks., , , and . Int. J. Inf. Comput. Secur., 16 (3/4): 226-238 (2021)