Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications., , , , , , , , , and 1 other author(s). IEEE Access, (2021)Binary nonogram puzzle based data hiding technique for data security., , , , and . Multim. Tools Appl., 83 (2): 4951-4992 (January 2024)High-Speed Network DDoS Attack Detection: A Survey., , , , , , and . Sensors, 23 (15): 6850 (August 2023)Optimized Visual Internet of Things for Video Streaming Enhancement in 5G Sensor Network Devices., , , , , and . Sensors, 23 (11): 5072 (2023)Machine Learning-Based Intrusion Detection Approaches for Secured Internet of Things., , , , , , , , , and 1 other author(s). The Effect of Information Technology on Business and Marketing Intelligence Systems, volume 1056 of Studies in Computational Intelligence, Springer, (2023)Penetration Testing for IoT Security: The Case Study of a Wireless IP Security CAM., , , , and . ICAIC, page 1-5. IEEE, (2023)Design of Lightweight Cryptography based Deep Learning Model for Side Channel Attacks., , , , , and . ITNAC, page 325-328. IEEE, (2023)Analytical Survey on the Security Framework of Cyber-Physical Systems for Smart Power System Networks., , , , and . ICCR, page 1-8. IEEE, (2022)Towards Privacy Provisioning for Internet of Things (IoT)., , , , , , , and . ICCR, page 1-7. IEEE, (2022)Cyber Security Threats on Digital Banking., , , , , , and . ICAIC, page 1-4. IEEE, (2022)