Author of the publication

Next generation technologies for smart healthcare: challenges, vision, model, trends and future directions.

, , , , , , , and . Internet Technol. Lett., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Internet of Things, Fog and Cloud continuum: Integration and challenges., , , , , , , , , and . Internet Things, (2018)Synthesising Privacy by Design Knowledge Toward Explainable Internet of Things Application Designing in Healthcare., , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 17 (2s): 62:1-62:29 (2021)Social Cloud Computing: A Vision for Socially Motivated Resource Sharing., , , and . IEEE Trans. Serv. Comput., 5 (4): 551-563 (2012)Modeling and Characterizing Service Interference in Dynamic Infrastructures., , , , and . IEEE Access, (2023)Privacy-Aware Cloud Auditing for GDPR Compliance Verification in Online Healthcare., , , , , , and . IEEE Trans. Ind. Informatics, 18 (7): 4808-4819 (2022)Privacy Preserving and Serverless Homomorphic-Based Searchable Encryption as a Service (SEaaS)., , , , , , and . IEEE Access, (2023)Software Infrastructure for Service and Device Management in Wireless Networks., and . International Conference on Internet Computing (1), page 68-74. CSREA Press, (2001)Extending Grid-Based Workflow Tools With Patterns/Operators., , and . Int. J. High Perform. Comput. Appl., 22 (3): 301-318 (2008)Prediction of drive-by download attacks on Twitter., , and . Inf. Process. Manag., 56 (3): 1133-1145 (2019)Cyberattacks and Countermeasures For In-Vehicle Networks., , , and . CoRR, (2020)