Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DDefender: Android application threat detection using static and dynamic analysis., , , , , and . ICCE, page 1-6. IEEE, (2018)New Optimized Adaptive Time Series IDS Classifier Algorithm: Beyond Deep Learning., , , , and . IEEE Access, (2023)PUREDroid: Permission Usage and Risk Estimation for Android Applications., , , , and . ICISDM, page 179-184. ACM, (2019)Secure software design evaluation and decision making model for ubiquitous computing: A two-stage ANN-Fuzzy AHP approach., and . Comput. Hum. Behav., (April 2024)Smart E-Learning Framework for Personalized Adaptive Learning and Sequential Path Recommendations Using Reinforcement Learning., , , , , and . IEEE Access, (2023)Improved Coyote Optimization Algorithm and Deep Learning Driven Activity Recognition in Healthcare., , , , , and . IEEE Access, (2024)A MapReduce Based Approach for Secure Batch Satellite Image Encryption., , , , and . IEEE Access, (2023)Location Privacy Challenges in Spatial Crowdsourcing., , , , , , , and . EIT, page 564-569. IEEE, (2018)VSKAP-IoD: A Verifiably Secure Key Agreement Protocol for Securing IoD Environment.. IEEE Access, (2024)Elevating Survivability in Next-Gen IoT-Fog-Cloud Networks: Scheduling Optimization With the Metaheuristic Mountain Gazelle Algorithm., , , , , , and . IEEE Trans. Consumer Electron., 70 (1): 3802-3809 (February 2024)