Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigating performance constraints for blockchain based secure e-voting system., , and . Future Gener. Comput. Syst., (2020)A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs., , , , and . Comput. Networks, (2021)S.U.S. You're SUS! - Identifying influencer hackers on dark web social networks., , and . Comput. Electr. Eng., (April 2023)Collaborative device-level botnet detection for internet of things., , and . Comput. Secur., (June 2023)A Quantum Key Distribution Network Through Single Mode Optical Fiber, , , and . CoRR, (2009)A Quantum Key Distribution Network through Single Mode Optical Fiber., , , and . CTS, page 386-391. IEEE Computer Society, (2006)A bibliometric approach to quantitatively assess current research trends in 5G security., , and . Libr. Hi Tech, 39 (4): 1097-1120 (2021)Anomaly detection through keystroke and tap dynamics implemented via machine learning algorithms., , , and . Turkish J. Electr. Eng. Comput. Sci., 26 (4): 1698-1709 (2018)Simulation of transaction malleability attack for blockchain-based e-Voting., , and . Comput. Electr. Eng., (2020)Swarm Intelligence inspired Intrusion Detection Systems - A systematic literature review., , , and . Comput. Networks, (2022)