Author of the publication

Cipher Block Chaining Support Vector Machine for Secured Decentralized Cloud Enabled Intelligent IoT Architecture.

, , , , , , and . IEEE Access, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approach for Collision Minimization and Enhancement of Power Allocation in WSNs., , , , , , and . J. Sensors, (2021)Social Media and Steganography: Use, Risks and Current Status., , , and . IEEE Access, (2021)Machine-Learning-Based Spam Mail Detector., , , , , and . SN Comput. Sci., 4 (6): 858 (November 2023)A novel free space communication system using nonlinear InGaAsP microsystem resonators for enabling power-control toward smart cities., , , , , and . Wirel. Networks, 26 (4): 2317-2328 (2020)Admission control algorithm based on the effective bandwidth in vehicle-to-infrastructure communication., , , , and . IET Commun., 12 (6): 704-711 (2018)DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre., , , , , and . Secur. Commun. Networks, (2021)A New Combinational Technique in Image Steganography., , , and . Int. J. Inf. Secur. Priv., 15 (3): 48-64 (2021)Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks., , , , , and . J. Ambient Intell. Humaniz. Comput., 11 (11): 4995-5001 (2020)Cipher Block Chaining Support Vector Machine for Secured Decentralized Cloud Enabled Intelligent IoT Architecture., , , , , , and . IEEE Access, (2021)Automated Risk Management Based Software Security Vulnerabilities Management., , , , and . IEEE Access, (2022)