Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling and analysis of port supply chain system based on Fabric blockchain., , , , , , and . Comput. Ind. Eng., 172 (Part): 108527 (2022)A Novel Approach for Fake News Detection in Vehicular Ad-Hoc Network (VANET)., , , , and . CSoNet, volume 12575 of Lecture Notes in Computer Science, page 386-397. Springer, (2020)On the File Recovery in Systems Infected by Ransomware., , , and . AINA, volume 1151 of Advances in Intelligent Systems and Computing, page 1412-1425. Springer, (2020)On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures., , , , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 37-54. Springer, (2016)One-pass lossless data hiding and compression of remote sensing data., , , , and . Future Gener. Comput. Syst., (2019)A two-stage intrusion detection approach for software-defined IoT networks., , , , and . Soft Comput., 25 (16): 10935-10951 (2021)An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications., , , , and . INCoS, page 157-165. IEEE, (2013)Parallel Low-Complexity Lossless Coding of Three-Dimensional Medical Images., , , and . NBiS, page 91-98. IEEE Computer Society, (2014)A Collaborative Decision-Support System for Secure Analysis of Cranial Disorders., , , and . INCoS, page 189-196. IEEE, (2014)Protection of Microscopy Images through Digital Watermarking Techniques., , , , and . INCoS, page 65-72. IEEE, (2014)