Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet of Intelligent Vehicles (IoIV): An Intelligent VANET Based Computing via Predictive Modeling., , and . IEEE Access, (2023)The ingenuity of malware substitution: Bypassing next-generation Antivirus., , and . ICAC, page 1-5. IEEE, (2021)Risk Assessment of SCADA Cyber Attack Methods: A Technical Review on Securing Automated Real-time SCADA Systems., , , , and . ICAC, page 1-6. IEEE, (2022)A Novel Delay Constraint Location Privacy Scheme in VANETs., , , and . VTC Fall, page 1-5. IEEE, (2017)Complex Adaptive Systems: A Data Modelling and Engineering Perspective., , , and . ICISDM, page 44-48. ACM, (2018)Exploring IoT Applications for Disaster Management: Identifying Key Factors and Proposing Future Directions., , , , and . Recent Trends and Advances in Wireless and IoT-enabled Networks, Springer, (2019)A methodology to characterize and compute correlation between traffic congestion and health issues via social media., , , and . ICAC, page 1-6. IEEE, (2018)EK-Healthcare: Effectiveness of IoT in the Medical Field with Enhanced Features., and . ICAC, page 1-6. IEEE, (2018)The framework for efficient passphrase-based multifactor authentication in cloud computing., , and . ICAC, page 37-41. IEEE, (2016)A Novel Model for HD video calling in 5G Networks., , , , and . ICAC, page 1-6. IEEE, (2019)