Author of the publication

ATHENA: A Pagerank-based Scheme to Solve the Thundering Herd in Authentication.

, , , , and . VNC, page 1-4. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid feature selection technique for intrusion detection system., , and . IJHPCN, 13 (2): 232-240 (2019)A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape., , , , and . CoRR, (2019)Improving the Cybersecurity of Critical National Infrastructure using Modelling and Simulation., , , , , and . CoRR, (2022)A Meta-Learning Approach to the Optimal Power Flow Problem Under Topology Reconfigurations., , , and . CoRR, (2020)Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security., , , , , and . IEEE Trans. Engineering Management, 67 (4): 1059-1073 (2020)FLAIM: AIM-based Synthetic Data Generation in the Federated Setting., , and . CoRR, (2023)A novel symmetric key cryptographic authentication for cooperative communication in cognitive radio networks., , , and . ICAC, page 1-5. IEEE, (2013)Subspace-based SNR estimator for OFDM system under different channel conditions., , , , , and . BMSB, page 1-5. IEEE, (2013)Classification of multi-channels SEMG signals using wavelet and neural networks on assistive robot., , , , and . INDIN, page 1158-1163. IEEE, (2012)Prevention of IoT-Enabled Crime Using Home Routers (PITCHR)., , and . SmartCity360°, volume 442 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 470-481. Springer, (2021)