Author of the publication

IMPACT: Impersonation Attack Detection via Edge Computing Using Deep Autoencoder and Feature Abstraction.

, , , , , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New secure healthcare system using cloud of things., , , , and . Clust. Comput., 20 (3): 2211-2229 (2017)A Machine Learning Framework for Biometric Authentication Using Electrocardiogram., , , and . IEEE Access, (2019)Security enhancements to TLS for improved national control., , and . ICITST, page 274-279. IEEE, (2017)Monitoring darknet activities by using network telescope., , and . ICITST, page 123-128. IEEE, (2017)Empirical Studies of TESLA Protocol: Properties, Implementations, and Replacement of Public Cryptography Using Biometric Authentication., , , and . IEEE Access, (2022)Explainable artificial intelligence to evaluate industrial internal security using EEG signals in IoT framework., , , , , , and . Ad Hoc Networks, (2021)Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research., , , , and . CoRR, (2022)Digital Forensic Analysis of Files Using Deep Learning., , , and . ICSPIS, page 1-4. IEEE, (2020)Design, analysis and applications of cryptographic techniques.. Royal Holloway, University of London, UK, (2000)British Library, EThOS.RFID lightweight mutual authentication using shrinking generator., , and . ICITST, page 1-6. IEEE, (2009)