Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey., , , , , and . IEEE Access, (2024)Web application security vulnerabilities detection approaches: A systematic mapping study., , , , , and . SNPD, page 469-474. IEEE Computer Society, (2015)Agent-Based Medical Health Monitoring System., , , and . Sensors, 22 (8): 2820 (2022)Cyber Security and Privacy Issues in Industrial Internet of Things., , and . Comput. Syst. Sci. Eng., 37 (3): 361-380 (2021)A Survey on Continuous Object Tracking and Boundary Detection Schemes in IoT Assisted Wireless Sensor Networks., , , , , , , and . IEEE Access, (2021)Performance Enhancement in Wireless Body Area Networks with Secure Communication., , , , and . Wirel. Pers. Commun., 116 (1): 1-22 (2021)GITM: A GINI Index-Based Trust Mechanism to Mitigate and Isolate Sybil Attack in RPL-Enabled Smart Grid Advanced Metering Infrastructures., , , , , , , and . IEEE Access, (2023)Toward a readiness model for secure software coding., , , , and . Softw. Pract. Exp., 53 (4): 1013-1035 (April 2023)A Machine Learning-Based Framework for Accurate and Early Diagnosis of Liver Diseases: A Comprehensive Study on Feature Selection, Data Imbalance, and Algorithmic Performance., , , , , , , , and . Int. J. Intell. Syst., (2024)An Empirical Study of the Complex Relationship between KMR and Trust in GSD., and . J. Softw., 8 (4): 776-784 (2013)