Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Child Safety Using Edge-Fog-Cloud Enabled Smart IoT Wearable Device: An Architecture., , and . COMSNETS, page 61-66. IEEE, (2024)Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching., and . CVPR Workshops, page 85-92. IEEE Computer Society, (2009)Shaping the future of industry: Understanding the dynamics of industrial digital twins., and . Comput. Ind. Eng., (2024)Securing UAV Communications: A Comparative Performance Analysis of Post-Quantum Cryptographic Techniques., , , and . COMSNETS, page 1096-1101. IEEE, (2025)Improved Load Balancing and Partitioning Model for Cloud Networks., , and . OCIT, page 803-808. IEEE, (2024)A Lightweight Approach to Detect the Low/High Rate IP Spoofed Cloud DDoS Attacks., and . SC², page 118-123. IEEE Computer Society, (2017)Barriers in Business-IT Alignment in the Banking Sector in a Developing Country: A Case Study of Commercial Banks in the Gambia., , and . EMCIS, volume 381 of Lecture Notes in Business Information Processing, page 498-511. Springer, (2019)Detection of Low-Rate Cloud DDoS Attacks in Frequency Domain Using Fast Hartley Transform., and . Wirel. Pers. Commun., 112 (3): 1735-1762 (2020)SwiftFrame: Developing Low-latency Near Real-time Response Framework., , , and . ICCCNT, page 1-6. IEEE, (2024)ACL Assisted Security Mechanism Against Low-Rate DDoS Attack in SDN-Cloud-IoT Networks., and . OCIT, page 823-828. IEEE, (2023)