Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT., , , , , and . ICCR, page 1-6. IEEE, (2024)A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution., , , , , , and . IEEE Access, (2022)The RPL Load Balancing in IoT Network with Burst Traffic Scenarios., , , and . SKIMA, page 1-7. IEEE, (2018)A Comparative Study of VANET Routing Protocols for Safety Applications., , , and . CAMAD, page 276-282. IEEE, (2023)A new efficient objective function for routing in Internet of Things paradigm., , , , and . CSCN, page 152-157. IEEE, (2016)Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme., , , , , , , and . Wirel. Pers. Commun., 125 (1): 513-530 (2022)SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain., , and . ICSA Companion, page 143-150. IEEE, (2020)(POSTER) Resolving the Decreased Rank Attack in RPL's IoT Networks., , , , , and . DCOSS-IoT, page 65-67. IEEE, (2023)E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks., , and . CIT/IUCC/DASC/PICom, page 1123-1129. IEEE, (2015)DID: RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity., , , , , , , and . CoRR, (2024)