Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Anonymization According to the Combination of Attributes on Social Network Sites., , and . SSCC, volume 377 of Communications in Computer and Information Science, page 272-280. Springer, (2013)Improved Intrusion Detection System Using Fuzzy Logic for Detecting Anamoly and Misuse Type of Attacks., and . SoCPaR, page 212-217. IEEE Computer Society, (2009)A Conceptual Framework to Ensure Privacy in Patient Record Management System., , , , and . IEEE Access, (2021)Classification of Third-Party Applications on Facebook to Mitigate Users' Information Leakage., , and . WorldCIST (1), volume 569 of Advances in Intelligent Systems and Computing, page 144-154. Springer, (2017)Enabling Data Hiding for Resource Sharing in Cloud Computing Environments Based on DNA Sequences., and . SERVICES, page 385-390. IEEE Computer Society, (2011)An Efficient Method for Detecting Fraudulent Transactions Using Classification Algorithms on an Anonymized Credit Card Data Set., , , , , and . ISDA, volume 736 of Advances in Intelligent Systems and Computing, page 418-429. Springer, (2017)A Novel Approach for Steganography App in Android OS., , , , , and . ISDA, volume 736 of Advances in Intelligent Systems and Computing, page 442-450. Springer, (2017)Vulnerabilities Analysis and Security Assessment Framework for the Internet of Things., , , , , and . CCC, page 22-29. IEEE, (2019)Leak detection and localization in underground water supply system using thermal imaging and geophone signals through machine learning., , , and . Intell. Syst. Appl., (2024)Novel Attack Detection Using Fuzzy Logic and Data Mining., and . Security and Management, page 26-31. CSREA Press, (2006)