Author of the publication

Enhancing End-to-End Communication Security in IoT Devices Through Application Layer Protocol.

, , , , and . ICIST, volume 1665 of Communications in Computer and Information Science, page 148-159. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation of SMART on FHIR in Developing Countries Through SFPBRF., , and . ICBBE, page 137-144. ACM, (2018)A Model-Driven Framework for the Prevention of DoS Attacks in Software Defined Networking (SDN)., , , , , and . SysCon, page 1-7. IEEE, (2021)Model Driven Approach for Automatic Script Generation in Stress Testing of Web Applications., , , and . ICCTA, page 46-50. ACM, (2020)A Model-Driven Approach for Simplified Cluster Based Test Suite Optimization of Industrial Systems - An Introduction to UMLTSO., , , , and . CISIM, volume 11703 of Lecture Notes in Computer Science, page 152-163. Springer, (2019)Towards Generic User Interface for Web Based Systems Serving Similar Functions., , and . SERA, page 297-306. IEEE Computer Society, (2006)MoDLF: a model-driven deep learning framework for autonomous vehicle perception (AVP)., , , , and . MoDELS, page 187-198. ACM, (2022)Bridging the Gap between Design and Verification of Embedded Systems in Model Based System Engineering: A Meta-model for Modeling Universal Verification Methodology (UVM) Test Benches., , , , and . ICCMS, page 82-87. ACM, (2020)A Multi-purpose Model Driven Platform for Contingency Planning and Shaping Response Measures., , , , and . CISIM, volume 12133 of Lecture Notes in Computer Science, page 320-331. Springer, (2020)A Comprehensive Investigation of Universal Verification Methodology (UVM) Standard for Design Verification., , , , and . ICSCA, page 339-343. ACM, (2020)A Model-Driven Approach for Access Control in Internet of Things (IoT) Applications - An Introduction to UMLOA., , , , and . ICIST, volume 920 of Communications in Computer and Information Science, page 198-209. Springer, (2018)