Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A DDoS attack detection and defense scheme using time-series analysis for SDN., , and . J. Inf. Secur. Appl., (2020)A DDoS attack detection and countermeasure scheme based on DWT and auto-encoder neural network for SDN., , and . Comput. Networks, (2022)Time-Slotted ALOHA-based LoRaWAN Scheduling with Aggregated Acknowledgement Approach., , and . FRUCT, page 383-390. IEEE, (2019)Workshop on Privacy Challenges in Public and Private Organizations., , , and . Privacy and Identity Management, volume 576 of IFIP Advances in Information and Communication Technology, page 82-89. Springer, (2019)A key agreement protocol with partial backward confidentiality., , , and . Comput. Networks, (2017)ProteiNN: Privacy-preserving One-to-Many Neural Network Classifications., , and . ICETE (2), page 397-404. ScitePress, (2020)A Novel Approach for distributed denial of service defense using continuous wavelet transform and convolutional neural network for software-Defined network., , and . Comput. Secur., (2022)Privacy-Preserving Voice Anti-Spoofing Using Secure Multi-Party Computation., , , , , , , , , and 1 other author(s). Interspeech, page 856-860. ISCA, (2021)Dynamic Group Key Agreement for Resource-constrained Devices Using Blockchains., , , and . ACNS Workshops, volume 12418 of Lecture Notes in Computer Science, page 58-76. Springer, (2020)An improved fault-tolerant conference-key agreement protocol with forward secrecy., , , and . SIN, page 306-310. ACM, (2013)