Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging lightweight blockchain to establish data integrity for surveillance cameras., , , , and . CoRR, (2019)De-Anonymisation Attacks on Tor: A Survey., , , , and . IEEE Commun. Surv. Tutorials, 23 (4): 2324-2350 (2021)Big Data in Motion: A Vehicle-Assisted Urban Computing Framework for Smart Cities., , , , and . IEEE Access, (2019)Enhanced Human Activity Recognition Based on Smartphone Sensor Data Using Hybrid Feature Selection Model., , and . Sensors, 20 (1): 317 (2020)Fingerprinting SDN Policy Parameters: An Empirical Study., , , , and . IEEE Access, (2020)SEECSSim: A toolkit for parallel and distributed simulations for mobile devices., , , , , and . J. Simulation, 15 (3): 235-260 (2021)Achieving model explainability for intrusion detection in VANETs with LIME., , , , , and . PeerJ Comput. Sci., (2023)Anonymity with Tor: A Survey on Tor Attacks., , , , and . CoRR, (2020)An IoT-Based Health Care Solution: A Smart Medical Box., , , , , and . ASSE, page 228-237. ACM, (2023)DIMY: Enabling Privacy-preserving Contact Tracing., , , , , , and . CoRR, (2021)