Author of the publication

Smartphone Security Hardening: Threats to Organizational Security and Risk Mitigation.

, , , , , and . ICCR, page 1-12. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threat Modeling Framework For Security Of Unified Storages In Private Data Centers., , , and . CBI (2), page 111-120. IEEE, (2020)Enhancing Cybersecurity with Artificial Neural Networks: A Study on Threat Detection and Mitigation Strategies., , , , , , , and . ICCR, page 1-5. IEEE, (2024)Smart Exact String Matching Algorithm Specifically for DNA Sequencing., , , , , , and . ICCR, page 1-5. IEEE, (2024)The Threat of Deep Fake Technology to Trusted Identity Management., , , , , , and . ICCR, page 1-5. IEEE, (2022)Machine Learning-based Primary User Emulation Attack Detection In Cognitive Radio Networks using Pattern Described Link-Signature (PDLS)., , , , , and . WTS, page 1-7. IEEE, (2019)AI-Driven Approaches to Cybersecurity: The Impact of Machine and Deep Learning., , , , , , , and . ICCR, page 1-5. IEEE, (2024)The Hidden Ledger: Understanding Bitcoin's Pseudonymity in Dark Web Transactions., , , , , , and . ICCR, page 1-5. IEEE, (2024)Smartphone Security Hardening: Threats to Organizational Security and Risk Mitigation., , , , , and . ICCR, page 1-12. IEEE, (2022)Battle of Deep Fakes: Artificial Intelligence Set to Become a Major Threat to the Individual and National Security., , , , , and . ICCR, page 1-5. IEEE, (2022)The Synergy of Artificial Intelligence and Cybersecurity., , , , , , , and . ICCR, page 1-5. IEEE, (2024)