Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multikernel and Metaheuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer., , , , , and . IEEE Internet Things J., 8 (6): 4540-4547 (2021)Toward Vehicular Digital Forensics From Decentralized Trust: An Accountable, Privacy-Preserving, and Secure Realization., , , , and . IEEE Internet Things J., 9 (9): 7009-7024 (2022)A distributed approach to enabling privacy-preserving model-based classifier training., , , , and . Knowl. Inf. Syst., 20 (2): 157-185 (2009)Vehicular Networking: Protecting Vehicles from Imminent Cyber Threats., and . IEEE Commun. Stand. Mag., 2 (4): 72 (2018)Drones in the Era of V2X Communications., and . IEEE Commun. Stand. Mag., 3 (1): 10 (2019)One Secure IoT Scheme for Protection of True Nodes., , , , , and . SmartCom, volume 11344 of Lecture Notes in Computer Science, page 143-152. Springer, (2018)An effective behavior-based Android malware detection system., , and . Secur. Commun. Networks, 8 (12): 2079-2089 (2015)Privacy-Enhancing Fog Computing and Its Applications, , and . Springer Briefs in Electrical and Computer Engineering Springer, (2018)The Analysis and Implication of Data Deduplication in Digital Forensics., and . CSS, volume 13172 of Lecture Notes in Computer Science, page 198-215. Springer, (2021)Blockchain-based Health Data Sharing for Continuous Disease Surveillance in Smart Environments., , , , and . ICPADS, page 185-192. IEEE, (2022)