Author of the publication

Preemptive Prediction-Based Automated Cyberattack Framework Modeling.

, , , and . Symmetry, 13 (5): 793 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic map of blood flow distribution in the brain from the internal carotid artery., , , , , , , and . NeuroImage, 23 (4): 1422-1431 (2004)Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks., , , , , and . AST/UCMA/ISA/ACN, volume 6059 of Lecture Notes in Computer Science, page 159-174. Springer, (2010)3DE: selective cluster head selection scheme for energy efficiency in wireless sensor networks., , and . PETRA, ACM, (2009)An Approach to Reduce Storage for Homomorphic Computations., and . IACR Cryptology ePrint Archive, (2013)A new scale-invariant homomorphic encryption scheme., , and . Inf. Sci., (2018)Opportunistic Cooperation Based on Delayed Retransmissions for a Multi-User Uplink System., and . VTC Fall, page 1-4. IEEE, (2008)De-Identification Mechanism of User Data in Video Systems According to Risk Level for Preventing Leakage of Personal Healthcare Information., and . Sensors, 22 (7): 2589 (2022)A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE., , , , and . IACR Cryptol. ePrint Arch., (2016)RISA: A Real-Time Interactive Shadow Avatar., , and . ISM, page 112-122. IEEE Computer Society, (2007)Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing., and . Pers. Ubiquitous Comput., 26 (2): 345-353 (2022)