Author of the publication

A Distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT Systems by leveraging Fog computing.

, , , and . Trans. Emerg. Telecommun. Technol., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PPSF: A Privacy-Preserving and Secure Framework Using Blockchain-Based Machine-Learning for IoT-Driven Smart Cities., , , , , , and . IEEE Trans. Netw. Sci. Eng., 8 (3): 2326-2341 (2021)Efficient coverage and connectivity aware data gathering protocol for wireless sensor networks.. RAIT, page 50-55. IEEE, (2016)Design of a Fused Triple Convolutional Neural Network for Malware Detection: A Visual Classification Approach., , and . ICACDS (1), volume 1440 of Communications in Computer and Information Science, page 279-289. Springer, (2021)BRL-ETDM: Bayesian reinforcement learning-based explainable threat detection model for industry 5.0 network., , and . Clust. Comput., 27 (6): 8243-8268 (September 2024)A new localization using single mobile anchor and mesh-based path planning models., , and . Wirel. Networks, 25 (5): 2919-2929 (2019)Biogeography-based optimization scheme for solving the coverage and connected node placement problem for wireless sensor networks., and . Wirel. Networks, 25 (6): 3167-3177 (2019)An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks., , and . Comput. Commun., (2021)A Distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT Systems by leveraging Fog computing., , , and . Trans. Emerg. Telecommun. Technol., (2021)Optimal path planning for UAV using NSGA-II based metaheuristic for sensor data gathering application in Wireless Sensor Networks., , and . ANTS, page 1-5. IEEE, (2019)P2IDF: A Privacy-Preserving based Intrusion Detection Framework for Software Defined Internet of Things-Fog (SDIoT-Fog)., , and . ICDCN (Adjunct Volume), page 37-42. ACM, (2021)