Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spammer detection and fake user identification on social networks, , , , , , and . IEEE Access, (2019)A Cost-Effective Optimization for Scheduling of Household Appliances and Energy Resources., , , , and . IEEE Access, (2021)FSR-Based Smart System for Detection of Wheelchair Sitting Postures Using Machine Learning Algorithms and Techniques., , , , , , , and . J. Sensors, (2022)A Lightweight and Secured Certificate-Based Proxy Signcryption (CB-PS) Scheme for E-Prescription Systems., , , , , and . IEEE Access, (2020)Privacy-Preserving Big Data Security for IoT With Federated Learning and Cryptography., , , and . IEEE Access, (2023)Improving risk assessment model of cyber security using fuzzy logic inference system., , , , and . Comput. Secur., (2018)Machine Learning-based Mist Computing Enabled Internet of Battlefield Things., , , , , , and . ACM Trans. Internet Techn., 21 (4): 101:1-101:26 (2021)A Lightweight Secure Data Aggregation Technique for Wireless Sensor Network., , , , , , and . ISM, page 387-392. IEEE Computer Society, (2014)GRA-PIN: A Graphical and PIN-Based Hybrid Authentication Approach for Smart Devices., , , , and . Sensors, 22 (4): 1349 (2022)Energy Harvested and Cooperative Enabled Efficient Routing Protocol (EHCRP) for IoT-WBAN., , , , , , , and . Sensors, 20 (21): 6267 (2020)