Author of the publication

Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks.

, , , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid feature descriptors to detect face spoof attacks., , , , , and . J. Intell. Fuzzy Syst., 34 (3): 1411-1419 (2018)Asynchronous Time encoder based quasi-Static modelling for Human Area Network in VANET., , , , and . J. Comput. Sci., 10 (11): 2284-2291 (2014)LION IDS: A meta-heuristics approach to detect DDoS attacks against Software-Defined Networks., , and . Neural Comput. Appl., 31 (5): 1491-1501 (2019)Skin Cancer Segmentation Based on Triangular Intuitionistic Fuzzy Sets., , , and . SN Comput. Sci., 4 (3): 228 (May 2023)Correction: Skin Cancer Segmentation Based on Triangular Intuitionistic Fuzzy Sets., , , and . SN Comput. Sci., 4 (3): 279 (May 2023)FBMC-based dispersion compensation using artificial neural network equalization for long reach-passive optical network., , and . Int. J. Wavelets Multiresolution Inf. Process., 18 (1): 1941011:1-1941011:20 (2020)Multi keyword searchable attribute based encryption for efficient retrieval of health Records in Cloud., , , , and . Multim. Tools Appl., 81 (16): 22065-22085 (2022)MetaHap: A Low Cost Haptic Glove for Metaverse., , , , , and . IFIPIoT (1), volume 683 of IFIP Advances in Information and Communication Technology, page 362-372. Springer, (2023)Optimized cluster centroids for segmentation of skin cancer using triangular intuitionistic fuzzy sets., , , and . ACM, volume 3445 of CEUR Workshop Proceedings, page 66-85. CEUR-WS.org, (2022)Analyzing ConvNets Depth for Deep Face Recognition., , , , , and . CVIP (1), volume 703 of Advances in Intelligent Systems and Computing, page 317-330. Springer, (2017)