Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Drone Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models., , , , , , and . Int. J. Digit. Crime Forensics, 13 (1): 1-25 (2021)DeepClassRooms: a deep learning based digital twin framework for on-campus class rooms., , , , , and . Neural Comput. Appl., 35 (11): 8017-8026 (April 2023)Guaranteed lifetime protocol for IoT based wireless sensor networks with multiple constraints., , , , , , and . Ad Hoc Networks, (2020)Improving Source location privacy in social Internet of Things using a hybrid phantom routing technique., , , , , and . Comput. Secur., (2022)Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications., , , , and . Ann. des Télécommunications, 78 (3-4): 183-208 (April 2023)An Enhanced Temperature Aware Routing Protocol in Wireless Body Area Networks., , and . COMPSAC (1), page 789-790. IEEE Computer Society, (2018)Micro-context recognition of sedentary behaviour using smartphone., , , , and . DICTAP, page 30-34. IEEE, (2016)A prudent based approach for compromised user credentials detection., , , , , and . Clust. Comput., 21 (1): 423-441 (2018)Gene encoder: a feature selection technique through unsupervised deep learning-based clustering for large gene expression data., , , , and . Neural Comput. Appl., 34 (11): 8309-8331 (2022)Fuzzy Energy Efficient Routing for Internet of Things (IoT).. ICUFN, page 320-325. IEEE, (2018)