Author of the publication

A novel countermeasure technique for reactive jamming attack in internet of things.

, , , , , and . Multim. Tools Appl., 78 (21): 29899-29920 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid Feature Selection Based on Principal Component Analysis and Grey Wolf Optimizer Algorithm for Arabic News Article Classification., , , , , , and . IEEE Access, (2022)E-Learning-Based Cloud Computing Environment: A Systematic Review, Challenges, and Opportunities., , , , , , , , and . IEEE Access, (2024)A single fault localization technique based on failed test input., , and . Array, (2019)Internet of Things security: A survey., , , and . J. Netw. Comput. Appl., (2017)Enabling Communication Technologies for Smart Cities., , , , , and . IEEE Commun. Mag., 55 (1): 112-120 (2017)Blending Big Data Analytics: Review on Challenges and a Recent Study., , , , , , and . IEEE Access, (2020)Spatio-Temporal Sentiment Mining of COVID-19 Arabic Social Media., , , and . ISPRS Int. J. Geo Inf., 11 (9): 476 (2022)Real-time big data processing for anomaly detection: A Survey., , , , , and . Int. J. Inf. Manag., (2019)Progress on Artificial Neural Networks for Big Data Analytics: A Survey., , , , , , , , , and 2 other author(s). IEEE Access, (2019)The rise of "big data" on cloud computing: Review and open research issues., , , , , and . Inf. Syst., (2015)