Author of the publication

A blockchain-based decentralized efficient investigation framework for IoT digital forensics.

, , , and . J. Supercomput., 75 (8): 4372-4387 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weak Keys of the Block Cipher SEED-192 for Related-Key Differential Attacks., , and . STA, volume 186 of Communications in Computer and Information Science, page 157-163. Springer, (2011)Design and analysis of a self-tuning feedback controller for the Internet., , , , and . Comput. Networks, 53 (11): 1784-1797 (2009)Using Multi-Modal Semantic Association Rules to fuse keywords and visual features automatically for Web image retrieval., , , and . Inf. Fusion, 12 (3): 223-230 (2011)Smart devices and spaces for pervasive computing., , and . J. Syst. Archit., 60 (8): 668-670 (2014)Authentication and ID-Based Key Management Protocol in Pervasive Environment., , , and . Wireless Personal Communications, 55 (1): 91-103 (2010)Concurrent multipath transmission with forward error correction mechanism to overcome burst packet losses for delay-sensitive video streaming in wireless home networks., , and . Multimedia Tools Appl., 65 (2): 201-220 (2013)Design of QoS in Intelligent Communication Environments Based on Neural Network., , , , and . Wireless Personal Communications, 56 (1): 97-115 (2011)Adaptive Body Posture Analysis for Elderly-Falling Detection with Multisensors., , , and . IEEE Intelligent Systems, 25 (2): 20-30 (2010)A secure-coding and vulnerability check system based on smart-fuzzing and exploit., and . Neurocomputing, (2017)Memory ECC architecutre utilizing memory column spares., and . ISOCC, page 359-360. IEEE, (2016)