Author of the publication

An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures.

, , and . Inf. Secur. J. A Glob. Perspect., 25 (4-6): 197-212 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GastroNet: Gastrointestinal Polyp and Abnormal Feature Detection and Classification With Deep Learning Approach., , , , , , , and . IEEE Access, (2023)MTD-DHJS: Makespan-Optimized Task Scheduling Algorithm for Cloud Computing With Dynamic Computational Time Prediction., , , , , , , , and . IEEE Access, (2023)Severity Classification of Diabetic Retinopathy Using an Ensemble Learning Algorithm through Analyzing Retinal Images., , , , , and . Symmetry, 13 (4): 670 (2021)Controlling the Outbreak of COVID-19: A Noncooperative Game Perspective., , , , , , , , , and 1 other author(s). CoRR, (2020)Impact Learning: A Learning Method from Features Impact and Competition., , , , , , , and . CoRR, (2022)eMBB-URLLC Resource Slicing: A Risk-Sensitive Approach., , , , and . IEEE Commun. Lett., 23 (4): 740-743 (2019)Impact learning: A learning method from feature's impact and competition., , , , , , , and . J. Comput. Sci., (May 2023)An overlapping coalition formation approach to maximize payoffs in cloud computing environment., , , , , and . ICOIN, page 324-329. IEEE Computer Society, (2016)ACC: Blockchain Based Trusted Management of Academic Credentials., , , , , and . iSES, page 438-443. IEEE, (2021)Coexistence Mechanism between eMBB and uRLLC in 5G Wireless Networks., , , , , , , and . CoRR, (2020)