Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A System to Retrofit Existing Infrastructure to be Smart and IoT Ready., , , and . ICVISP, page 54:1-54:6. ACM, (2020)Revolutionizing Healthcare: A Review Unveiling the Transformative Power of Digital Twins., , , and . IEEE Access, (2024)CLH: Approach for Detecting Deep Fake Videos., , , , and . ACeS, volume 1487 of Communications in Computer and Information Science, page 539-551. Springer, (2021)Comparative Analysis of Botnet and Ransomware for Early Detection., , , , , and . NEW2AN/ruSMART (1), volume 14542 of Lecture Notes in Computer Science, page 296-308. Springer, (2023)Non-Fungible Token Enhanced Blockchain-Based Online Social Network., , , , , and . IEEE Access, (2024)API Traffic Anomaly Detection in Microservice Architecture., , , , , and . CCGridW, page 206-213. IEEE, (2023)Blockchain in the Electronics Industry for Supply Chain Management: A Survey., , , , , and . IEEE Access, (2024)Predicting and Preventing Malware in Machine Learning Model., , and . ICCCNT, page 1-7. IEEE, (2019)SQL Injection Attack Detection using ResNet., , and . ICCCNT, page 1-7. IEEE, (2019)Secure Wipe Out in BYOD Environment., , , , and . IWBIS, page 109-114. IEEE, (2020)