From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A multi-channel steganographic protocol for secure SMS mobile banking., , , и . ICITST, стр. 248-253. IEEE, (2017)Efficient Cyber-Evidence Sharing Using Zero-Knowledge Proofs., и . Cyber Science, стр. 229-242. Springer, (2022)Moving assets to the cloud: A game theoretic approach based on trust., и . CyberSA, стр. 1-5. IEEE, (2015)Chaos-based image encryption using an AONT mode of operation., , и . CyberSA, стр. 1-5. IEEE, (2015)Ensuring Message Freshness in A Multi-Channel SMS Steganographic Banking Protocol., , , и . Cyber Security, стр. 1-7. IEEE, (2018)Hide-as-you-Type: An Approach to Natural Language Steganography through Sentence Modification., , и . HPCC/CSS/ICESS, стр. 945-952. IEEE, (2014)Security attacks on smart grid scheduling and their defences: a game-theoretic approach., , , , , , , и . Int. J. Inf. Sec., 19 (4): 427-443 (2020)Improved software vulnerability patching techniques using CVSS and game theory., , , , , и . Cyber Security, стр. 1-6. IEEE, (2017)A Secure Framework for Anti-Money-Laundering using Machine Learning and Secret Sharing., , и . Cyber Security, стр. 1-7. IEEE, (2020)An evaluation of feature selection and reduction algorithms for network IDS data., , и . CyberSA, стр. 1-2. IEEE, (2015)