Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cybers Security Analysis and Measurement Tools Using Machine Learning Approach., , , , , and . ICAIC, page 1-4. IEEE, (2022)Mechanisms for Protecting Information in E-Government., , , , and . ICCR, page 1-5. IEEE, (2024)Blockchain and its Integration with IoT Security., , , , and . ICCR, page 1-4. IEEE, (2024)Exploring Cyber Investigators: An In-Depth Examination of the Field of Digital Forensics., , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 84-88. IEEE, (2023)Review of Fundamental, Security, and Privacy in Metaverse., , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 408-414. IEEE, (2023)Securing Smart Cities Using Blockchain Technology., , , , , , , and . ICAIC, page 1-4. IEEE, (2022)Resource discovery and distributed computing over peer-to-peer networks.. Bangor University, UK, (2005)British Library, EThOS.Intelligence Skin Cancer Detection using IoT with a Fuzzy Expert System., , , , , and . ICCR, page 1-6. IEEE, (2022)The Blackboard Resource Discovery Mechanism for Distributed Computing Over Peer-to-Peer Networks., and . Parallel and Distributed Computing and Networks, page 289-294. IASTED/ACTA Press, (2005)Review of Security Challenges Encountered in Internet of Things Technology., , , , and . ICCR, page 1-6. IEEE, (2024)