From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

IoT Nodes Behavior Analysis Under Constrained Environment Using RPL Protocol., , и . MENACOMM, стр. 74-79. IEEE, (2021)Secure Chat Room Application Using AES-GCM Encryption and SHA-256., , , и . IIT, стр. 180-185. IEEE, (2023)Smart Edge-Based Driver Drowsiness Detection in Mobile Crowdsourcing., , , и . IEEE Access, (2023)Mobile and Web Applications Clones: A Comprehensive Study., , , и . IWCMC, стр. 464-469. IEEE, (2023)Toward a Secure Healthcare Ecosystem: A Convergence of Edge Analytics, Blockchain, and Federated Learning., , и . DRCN, стр. 1-5. IEEE, (2024)FL-Trickle: New Enhancement of Trickle Algorithm for Low Power and Lossy Networks., , , и . WCNC, стр. 1-6. IEEE, (2019)Slinker: A Safe Linker For An Efficient Data Encryption., , , , и . WINCOM, стр. 1-6. IEEE, (2023)Smart Edge-based Fake News Detection using Pre-trained BERT Model., , и . WiMob, стр. 437-442. IEEE, (2022)Toward Secure and Trustworthy Vehicular Fog Computing: A Survey., , , и . IEEE Access, (2024)Abnormal Network Traffic Detection using Deep Learning Models in IoT environment., , и . MENACOMM, стр. 98-103. IEEE, (2021)