Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and Privacy Challenges in 5G-enabled Technology., , , and . CSCloud/EdgeCom, page 53-58. IEEE, (2021)SMART & Secure AV Communication with the Edge in 5G and Beyond.. ICCE, page 1-6. IEEE, (2023)Hybrid Quantum-Classical Machine Learning for Near Real-time Space to Ground Communication of ISS Lightning Imaging Sensor Data., and . CCWC, page 114-122. IEEE, (2023)Big Data Technology in Healthcare: A Survey., , , and . NTMS, page 1-5. IEEE, (2019)Secure Disintegration Protocol for Privacy Preserving Cloud Storage., , , , and . Wirel. Pers. Commun., 103 (2): 1161-1177 (2018)Machine Learning based Trust Model for Secure Internet of Vehicle Data Exchange., and . GLOBECOM (Workshops), page 1-6. IEEE, (2020)SUDP: The Frontier Tool for Security in 5G and Beyond Wired or Wireless Communication., and . GLOBECOM (Workshops), page 1-6. IEEE, (2021)A Curriculum for Future Information Technology., , and . CSEDU (1), page 360-366. SciTePress, (2014)Building an Authentic and Ethical Keyword Search by applying Decentralised (Blockchain) Verification., , , , and . INFOCOM Workshops, page 746-753. IEEE, (2020)An Approach in Big Data Analytics to Improve the Velocity of Unstructured Data Using MapReduce., , , , and . Int. J. Syst. Dyn. Appl., 10 (4): 1-25 (October 2021)