Author of the publication

Integrated Architecture of Data Warehouse with Business Intelligence Technologies.

, , and . ICAC, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet of Intelligent Vehicles (IoIV): An Intelligent VANET Based Computing via Predictive Modeling., , and . IEEE Access, (2023)A Novel Delay Constraint Location Privacy Scheme in VANETs., , , and . VTC Fall, page 1-5. IEEE, (2017)The ingenuity of malware substitution: Bypassing next-generation Antivirus., , and . ICAC, page 1-5. IEEE, (2021)Risk Assessment of SCADA Cyber Attack Methods: A Technical Review on Securing Automated Real-time SCADA Systems., , , , and . ICAC, page 1-6. IEEE, (2022)Complex Adaptive Systems: A Data Modelling and Engineering Perspective., , , and . ICISDM, page 44-48. ACM, (2018)Software Defined Network (SDN) Based Internet of Things (IoT): A Road Ahead., , , and . ICFNDS, page 15:1-15:8. ACM, (2017)Exploring IoT Applications for Disaster Management: Identifying Key Factors and Proposing Future Directions., , , , and . Recent Trends and Advances in Wireless and IoT-enabled Networks, Springer, (2019)ScreenStealer: Addressing Screenshot attacks on Android devices., and . ICAC, page 336-341. IEEE, (2016)A methodology to characterize and compute correlation between traffic congestion and health issues via social media., , , and . ICAC, page 1-6. IEEE, (2018)EK-Healthcare: Effectiveness of IoT in the Medical Field with Enhanced Features., and . ICAC, page 1-6. IEEE, (2018)