Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ephemeral ID Beacon-Based Improved Indoor Positioning System., , and . Symmetry, 10 (11): 622 (2018)A new cost-saving and efficient method for patch management using blockchain., and . J. Supercomput., 76 (7): 5301-5319 (2020)Encrypted Network Traffic Analysis Method via Secure Socket Layer Handshake Control., , and . MUE/FutureTech, volume 448 of Lecture Notes in Electrical Engineering, page 61-66. (2017)VoIP Secure Communication Protocol satisfying Backward Compatibility., , , and . ICSNC, page 43. IEEE Computer Society, (2007)Property Analysis of SMS Spam Using Text Mining., , and . MUE/FutureTech, volume 448 of Lecture Notes in Electrical Engineering, page 67-73. (2017)IANA Registry Update for Support of the SEED Cipher Algorithm in Multimedia Internet KEYing (MIKEY)., , , , and . RFC, (August 2010)Patch Integrity Verification Method Using Dual Electronic Signatures., and . J. Inf. Process. Syst., 13 (6): 1516-1526 (2017)A Study on Variant Malware Detection Techniques Using Static and Dynamic Features., and . J. Inf. Process. Syst., 16 (4): 882-895 (2020)Enhancing the Reliability of Wi-Fi Network Using Evil Twin AP Detection Method Based on Machine Learning., , and . J. Inf. Process. Syst., 16 (3): 541-556 (2020)Detection of damaged files and measurement of similarity to originals using entropy graph characteristics., , and . J. Supercomput., 74 (12): 6719-6728 (2018)