Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Teaching Cybersecurity Using the Cloud., , and . IEEE Trans. Learn. Technol., 8 (4): 383-392 (2015)Blockchain and NFTs for Trusted Ownership, Trading, and Access of AI Models., , , , , and . IEEE Access, (2022)Supply Chain Inventory Sharing Using Ethereum Blockchain and Smart Contracts., , , , , and . IEEE Access, (2022)Blockchain-Based Traceability for Shipping Containers in Unimodal and Multimodal Logistics., , , , , and . IEEE Access, (2022)Blockchain-Based Proof of Delivery of Physical Assets With Single and Multiple Transporters., and . IEEE Access, (2018)Blockchain-Based Forward Supply Chain and Waste Management for COVID-19 Medical Equipment and Supplies., , , , , and . IEEE Access, (2021)Blockchain-Based Management for Organ Donation and Transplantation., , , , , and . IEEE Access, (2022)Blockchain for Waste Management in Smart Cities: A Survey., , , , and . IEEE Access, (2021)An analytical simulator for deploying IP telephony., , , and . Int. J. Netw. Manag., 19 (1): 25-37 (2009)Multi-Agent pattern recognition mechanism for detecting distributed denial of service attacks., and . IET Inf. Secur., 4 (4): 333-343 (2010)