Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks., , and . Comput. Commun., (2021)Fog Intelligence for Secure Smart Villages: Architecture and Future Challenges., , , , and . IEEE Consumer Electron. Mag., 12 (5): 12-21 (September 2023)Mobility-Enabled Sustainable Data Collection in Wireless Sensor Networks., and . Peer Peer Netw. Appl., 16 (2): 1199-1210 (March 2023)Compliant Fluidic Control Structures: Concept and Synthesis Approach., , , and . CoRR, (2018)A Distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT Systems by leveraging Fog computing., , , and . Trans. Emerg. Telecommun. Technol., (2021)Enhanced Supply Chain Management in Indian Agriculture Using SSI and Blockchain Leveraged by Digital Wallet., , , and . COMSNETS, page 427-429. IEEE, (2024)P2IDF: A Privacy-Preserving based Intrusion Detection Framework for Software Defined Internet of Things-Fog (SDIoT-Fog)., , and . ICDCN (Adjunct Volume), page 37-42. ACM, (2021)Performance Analysis of RZF precoding and Mean based Calibration for Channel Reciprocity., , and . ICCCS, page 1-6. IEEE, (2020)An Improved Tour Length Minimization for Single Hop Data Gathering in Wireless Sensor Network., , and . ICCCT, page 72-77. ACM, (2017)An Integrated Framework for Enhancing Security and Privacy in IoT-Based Business Intelligence Applications., , , and . ICCE, page 1-6. IEEE, (2023)