Author of the publication

Recent research in computational intelligence paradigms into security and privacy for online social networks (OSNs).

, , , , , and . Future Gener. Comput. Syst., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defending against Phishing Attacks: Taxonomy of Methods, Current Issues and Future Directions., , and . CoRR, (2017)Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations., , , , , and . IEEE Internet Things J., 6 (2): 1402-1409 (2019)Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain., , , , and . Multim. Tools Appl., 76 (18): 18451-18472 (2017)Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing., , and . Int. J. E Serv. Mob. Appl., 10 (3): 61-83 (2018)Vulnerability Analysis for the Authentication Protocols in Trusted Computing Platforms and a Proposed Enhancement of the OffPAD Protocol., , , , , , and . IEEE Access, (2018)Efficient fingerprint matching on smart cards for high security and privacy in smart systems., , , and . Inf. Sci., (2019)Medical Image Forgery Detection for Smart Healthcare., , , and . IEEE Commun. Mag., 56 (4): 33-37 (2018)Deep learning models for human centered computing in fog and mobile edge networks., , and . J. Ambient Intell. Humaniz. Comput., 10 (8): 2907-2911 (2019)The Meta-Fusion: A Cloud-Integrated Study on Blockchain Technology Enabling Secure and Efficient Virtual Worlds., , , , , , and . Int. J. Cloud Appl. Comput., 13 (1): 1-24 (2023)Assessment of Honeypots: Issues, Challenges and Future Directions., and . Int. J. Cloud Appl. Comput., 8 (1): 21-54 (2018)