Author of the publication

Blockchain-enabled access control to prevent cyber attacks in IoT: Systematic literature review.

, , and . Frontiers Big Data, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Metric for the Activeness of a Distributed Object Oriented Component Library, , , and . CoRR, (2012)Business Rules for Business Governance., , and . ICEIS (3), page 360-367. SciTePress, (2014)DolNet: A Division Of Labour Based Distributed Object Oriented Software Process Model, and . CoRR, (2012)Neural network-based routing protocol for opportunistic networks with intelligent water drop optimization., , and . Int. J. Commun. Syst., (2020)Residual networks for text-independent speaker identification: Unleashing the power of residual learning., , , , and . J. Inf. Secur. Appl., (February 2024)Deep learning assisted COVID-19 detection using full CT-scans., , , and . Internet Things, (2021)Distributed probability density based multi-objective routing for Opp-IoT networks enabled by machine learning., , , , and . J. Intell. Fuzzy Syst., 42 (2): 1199-1211 (2022)Supernode routing: a grid-based message passing scheme for sparse opportunistic networks., , , and . J. Ambient Intell. Humaniz. Comput., 10 (4): 1307-1324 (2019)Early prediction and monitoring of sepsis using sequential long short term memory model., , , and . Expert Syst. J. Knowl. Eng., (2022)Modified minimum spanning tree based vertical fragmentation, allocation and replication approach in distributed multimedia databases., , , and . Multim. Tools Appl., 81 (26): 37101-37118 (2022)