Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An EEG Based Key Generation Cryptosystem using Diffie-Hellman And AES., , , , and . MENACOMM, page 1-6. IEEE, (2019)On the Design, Development and Implementation of Trust Evaluation Mechanism in Vehicular Networks., , , , and . AICCSA, page 1-7. IEEE Computer Society, (2019)MSIDN: Mitigation of Sophisticated Interest flooding-based DDoS attacks in Named Data Networking., , , , , , and . Future Gener. Comput. Syst., (2020)Introduction to the Special Section on Recent Advancements in Flying ad hoc Networks., , , and . Comput. Electr. Eng., (2019)Contact Tracing Platform in OSN for Prevention of Infectious Disease Outbreaks., , , , , and . CCNC, page 188-193. IEEE, (2023)Enhancing EEG Signal Classifier Robustness Against Adversarial Attacks Using a Generative Adversarial Network Approach., , , , and . IEEE Internet Things Mag., 7 (3): 44-49 (May 2024)COCOMA: a resource-optimized cooperative UAVs communication protocol for surveillance and monitoring applications., , , , , , and . Wirel. Networks, 30 (5): 4429-4445 (July 2024)Machine learning solutions for mobile internet of things security: A literature review and research agenda., , , , and . Trans. Emerg. Telecommun. Technol., (October 2024)TFDD: A trust-based framework for reliable data delivery and DoS defense in VANETs., , , and . Veh. Commun., (2017)Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure., , , , , and . Trans. Emerg. Telecommun. Technol., (2022)