Author of the publication

Evaluation metric for crypto-ransomware detection using machine learning.

, , and . J. Inf. Secur. Appl., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey on Continuous Object Tracking and Boundary Detection Schemes in IoT Assisted Wireless Sensor Networks., , , , , , , and . IEEE Access, (2021)Smart Home Automation Using Intelligent Electricity Dispatch., , , , , , and . IEEE Access, (2021)Smart traffic monitoring system using Unmanned Aerial Vehicles (UAVs)., , , , and . Comput. Commun., (2020)Using Dual Attention BiLSTM to Predict Vehicle Lane Changing Maneuvers on Highway Dataset., , , , and . Syst., 11 (4): 196 (April 2023)Cyber Security and Privacy Issues in Industrial Internet of Things., , and . Comput. Syst. Sci. Eng., 37 (3): 361-380 (2021)Anonymity Assurance Using Efficient Pseudonym Consumption in Internet of Vehicles., , , , , , and . Sensors, 23 (11): 5217 (2023)Smart Wireless Sensor Technology for Healthcare Monitoring System Using Cognitive Radio Networks., , , , , , and . Sensors, 23 (13): 6104 (July 2023)Proposing Encryption Selection Model for IoT Devices Based on IoT Device Design., , , and . ICACT, page 210-219. IEEE, (2022)FSE2R: An Improved Collision-Avoidance-based Energy Efficient Route Selection Protocol in USN., , , , , and . Comput. Syst. Sci. Eng., 44 (3): 2225-2242 (2023)IoT Wireless Intrusion Detection and Network Traffic Analysis., , , , and . Comput. Syst. Sci. Eng., 40 (3): 865-879 (2022)