Author of the publication

Cyber anonymity based on software-defined networking and Onion Routing (SOR).

, , , and . DSC, page 358-365. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DAMAC: A Delay-Aware MAC Protocol for Ad Hoc Underwater Acoustic Sensor Networks., , , , and . Sensors, 21 (15): 5229 (2021)AES Based White Box Cryptography in Digital Signature Verification., , , , and . Sensors, 22 (23): 9444 (2022)Towards understanding application performance and system behavior with the full dynticks feature., , , , and . CCWC, page 394-401. IEEE, (2018)Performance Analysis of Oracle Database in Virtual Environments., , , , and . AINA Workshops, page 1238-1245. IEEE Computer Society, (2012)Region of interest-based medical image encryption technique based on chaotic S-boxes., , , , , and . Expert Syst. Appl., 238 (Part E): 122030 (March 2024)Fault-Tolerant Partition Resolvability in Mesh Related Networks and Applications., , , , and . IEEE Access, (2022)Enhancing topic clustering for Arabic security news based on k-means and topic modelling., , and . IET Networks, 10 (6): 278-294 (2021)Preemptive Two-Stage Update Mechanism for Software-Defined Networks., , , and . LCN Symposium, page 26-33. IEEE, (2019)Mapping ERD to Knowledge Graph., , and . SERVICES, page 110-114. IEEE, (2019)Image Encryption Based on Elliptic Curve Points and Linear Fractional Transformation., , , , and . IEEE Access, (2024)