Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey., , , , and . IEEE Access, (2022)Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN., , , and . Int. J. Inf. Secur. Priv., 12 (1): 53-62 (2018)Adaptive Intrusion Detection in Edge Computing Using Cerebellar Model Articulation Controller and Spline Fit., , , , , and . IEEE Trans. Serv. Comput., 16 (2): 900-912 (March 2023)A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges., , , , and . IEEE Access, (2021)Improved Location Estimation in Wireless Sensor Networks Using a Vector-Based Swarm Optimized Connected Dominating Set., , , , , , and . Sensors, 19 (2): 376 (2019)Analog and Digital RoF Spatial Mux MIMO-LTE System based A2 (arithmetic Aquila) optimization model for 5G network., , and . ACM, volume 3445 of CEUR Workshop Proceedings, page 86-101. CEUR-WS.org, (2022)A Lattice Signcrypted Secured Localization in Wireless Sensor Networks., , , , and . IEEE Syst. J., 14 (3): 3949-3956 (2020)LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments., , , , , and . IEEE Access, (2021)A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions., , , , , and . J. Netw. Comput. Appl., (2022)LLMSTEP: LLM proofstep suggestions in Lean., and . CoRR, (2023)