Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IoT Nodes Behavior Analysis Under Constrained Environment Using RPL Protocol., , and . MENACOMM, page 74-79. IEEE, (2021)Smart Edge-Based Driver Drowsiness Detection in Mobile Crowdsourcing., , , and . IEEE Access, (2023)Secure Chat Room Application Using AES-GCM Encryption and SHA-256., , , and . IIT, page 180-185. IEEE, (2023)Mobile and Web Applications Clones: A Comprehensive Study., , , and . IWCMC, page 464-469. IEEE, (2023)Toward a Secure Healthcare Ecosystem: A Convergence of Edge Analytics, Blockchain, and Federated Learning., , and . DRCN, page 1-5. IEEE, (2024)FL-Trickle: New Enhancement of Trickle Algorithm for Low Power and Lossy Networks., , , and . WCNC, page 1-6. IEEE, (2019)Smart Edge-based Fake News Detection using Pre-trained BERT Model., , and . WiMob, page 437-442. IEEE, (2022)Slinker: A Safe Linker For An Efficient Data Encryption., , , , and . WINCOM, page 1-6. IEEE, (2023)RPL Enhancement Based FL-Trickle: A Novel Flexible Trickle Algorithm for Low Power and Lossy Networks., and . Wireless Personal Communications, 110 (3): 1403-1428 (2020)Abnormal Network Traffic Detection using Deep Learning Models in IoT environment., , and . MENACOMM, page 98-103. IEEE, (2021)