Author of the publication

Secure edge computing: An architectural approach and industrial use case.

, and . Internet Technol. Lett., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart Health: A Novel Paradigm to Control the Chickungunya Virus., , and . IEEE Internet Things J., 6 (2): 1306-1311 (2019)Mitigating Security Problems in Fog Computing System., and . IBICA, volume 419 of Lecture Notes in Networks and Systems, page 612-622. Springer, (2021)Security paradigm for remote health monitoring edge devices in internet of things., , , , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (6): 101478 (June 2023)Prediction of diabetic patients using various machine learning techniques., , , and . Int. J. Comput. Appl. Technol., 66 (2): 100-106 (2021)Study for Integrating IoT-IDS Datasets: Machine and Deep Learning for Secure IoT Network System., , and . EASE, page 686-691. ACM, (2024)Comparative Study of Classical and Quantum Cryptographic Techniques Using QKD Simulator., and . FICTA (1), volume 266 of Smart Innovation, Systems and Technologies, page 521-530. Springer, (2021)Can Sensors Collect Big Data? An Energy-Efficient Big Data Gathering Algorithm for a WSN., , , and . IEEE Trans. Ind. Informatics, 13 (4): 1961-1968 (2017)A genetic load balancing algorithm to improve the QoS metrics for software defined networking for multimedia applications., , , and . Multim. Tools Appl., 81 (7): 9111-9129 (2022)QoS aware cross layer paradigm for urban development applications in IoT., , , , and . Wirel. Networks, 26 (8): 6203-6214 (2020)Detecting Cyberattacks to Federated Learning on Software-Defined Networks., , , and . MEDES, volume 2022 of Communications in Computer and Information Science, page 120-132. Springer, (2023)