Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Almashor, Mahathir
add a person with the name Almashor, Mahathir
 

Other publications of authors with the same name

Cost Effective IoT-based Remote Healthcare Monitoring System for Developing Countries., , and . SmartIoT, page 13-20. IEEE, (2021)Timely Arbitrator Selection in P2P Virtual Environments with 3D Voronoi Diagrams., and . NCA, page 235-240. IEEE Computer Society, (2011)Towards Web Phishing Detection Limitations and Mitigation., , , , , , and . CoRR, (2022)Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns., , , , , , , , and . AINTEC, page 78-86. ACM, (2023)SMPC-based Federated Learning for 6G enabled Internet of Medical Things., , , , , and . CoRR, (2023)Characterizing Malicious URL Campaigns., , , , , , and . CoRR, (2021)PhishClone: Measuring the Efficacy of Cloning Evasion Attacks., , , and . CoRR, (2022)Radial Basis Function Network with Differential Privacy., , , , and . Future Gener. Comput. Syst., (2022)Evaluation of Federated Learning in Phishing Email Detection., , , , , , , and . Sensors, 23 (9): 4346 (2023)Load-Balancing Properties of 3D Voronoi Diagrams in Peer-to-Peer Virtual Environments., and . ICPADS, page 839-844. IEEE Computer Society, (2010)