Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699., , , , , and . Comput. Networks, (2021)A Comprehensive Analysis of Healthcare Websites Usability Features, Testing Techniques and Issues., , , , and . IEEE Access, (2022)BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails., , , , and . IEEE Syst. J., 16 (1): 1367-1378 (2022)Exploring Partitioning Attacks on the Bitcoin Network., , , , and . IEEE/ACM Trans. Netw., 30 (1): 202-214 (2022)Evaluation of Imputation Models Based on the Enhancement to Yield Forecasting., , , and . SMC, page 3416-3422. IEEE, (2021)Tackling Imputation Across Time Series Models Using Deep Learning and Ensemble Learning., , , and . SMC, page 3084-3090. IEEE, (2020)Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks., and . SP, page 111-125. IEEE, (2023)Action Knowledge Graph for Violence Detection Using Audiovisual Features., , , , , , and . ICCE, page 1-5. IEEE, (2024)SyncAttack: Double-spending in Bitcoin Without Mining Power., , and . CCS, page 1668-1685. ACM, (2021)Output Regulation of n-Link Robotic Manipulator Using Feedback Linearizable Systems under the Approach of Cascade High Gain Observers., , and . ICCMA, page 16-20. ACM, (2018)