Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Person recognition based on fusion of iris and periocular biometrics., , and . HIS, page 57-62. IEEE, (2012)Flexi-DNP3: Flexible distributed network protocol version 3 (DNP3) for SCADA security., , and . ReTIS, page 293-296. IEEE, (2011)Periocular recognition based on Gabor and Parzen PNN., , , , and . ICIP, page 4977-4981. IEEE, (2014)Performance Analysis of Channel Coding Techniques for 5G Networks., , and . ICACDS (1), volume 1440 of Communications in Computer and Information Science, page 303-316. Springer, (2021)Enhancing control system security of power grid using anomaly detection and behaviour analysis., , and . ICACCI, page 1249-1255. IEEE, (2017)A testbed for SCADA cyber security and intrusion detection., , , and . SSIC, page 1-6. IEEE, (2015)Assessment of the performance and efficiency of public services being delivered through mobile seva., , , , and . ICEGOV, page 431-434. ACM, (2014)An Approach towards Digital Signatures for e-Governance in India., , and . EGOSE, page 82-88. ACM, (2015)Unique Identity Enabled Service Delivery through NSDG., , , and . EGOVIS/EDEM, volume 7452 of Lecture Notes in Computer Science, page 103-111. Springer, (2012)Secure solution: One time mobile originated PKI., , , and . SysCon, page 1-6. IEEE, (2017)