Author of the publication

Explainable artificial intelligence envisioned security mechanism for cyber threat hunting.

, , , , , , and . Secur. Priv., (November 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes., , and . IEEE Access, (2021)Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET., , , , and . IEEE Trans. Netw. Sci. Eng., 9 (3): 1346-1358 (2022)Post-Quantum Lattice-Based Secure Reconciliation Enabled Key Agreement Protocol for IoT., , , , and . IEEE Internet Things J., 10 (3): 2680-2692 (February 2023)Explainable artificial intelligence envisioned security mechanism for cyber threat hunting., , , , , , and . Secur. Priv., (November 2023)Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves., , , and . Selected Areas in Cryptography, volume 3897 of Lecture Notes in Computer Science, page 205-220. Springer, (2005)A Robust Conditional Privacy-Preserving Authentication Protocol in VANET., , , and . MobiSec, volume 17 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 35-45. Springer, (2009)A Secure Batch Authentication Scheme for Multiaccess Edge Computing in 5G-Enabled Intelligent Transportation System., , , , , , and . IEEE Access, (2022)On the Design of a Privacy-Preserving Communication Scheme for Cloud-Based Digital Twin Environments Using Blockchain., , , , , and . IEEE Access, (2022)Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment., , , , , and . IEEE Access, (2018)An Online Face Recognition System Using Multiple Compressed Images over the Internet., , and . WISE, volume 3806 of Lecture Notes in Computer Science, page 569-576. Springer, (2005)