Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Li-IDS: An Approach Towards a Lightweight IDS for Resource-Constrained IoT., , and . SmartNets, page 1-6. IEEE, (2023)Economics of Cyber Security and the Way Forward., , and . Int. J. Cyber Warf. Terror., 6 (4): 41-57 (2016)IoT Powered Cancer Observation System., , , , , and . SMA, page 313-318. ACM, (2020)Performance Analysis of ZigBee-based IoT Prototype for Remote Monitoring in Power Grid Systems., , , , and . SMA, page 384-389. ACM, (2020)Mobile-Controlled UAVs for Audio Delivery Service and Payload Tracking Solution., , , , , , , and . IEEE Access, (2019)Impact of Features Reduction on Machine Learning Based Intrusion Detection Systems., , and . EAI Endorsed Trans. Scalable Inf. Syst., 9 (6): e9 (2022)An Ontology based Approach for Messages Dissemination in Vehicular Ad Hoc Networks., , and . EAI Endorsed Trans. Scalable Inf. Syst., 5 (16): e2 (2018)An efficient construction of key-dependent substitution box based on chaotic sine map., , , and . IJDSN, (2019)Improving Discriminating Accuracy Rate of DDoS Attacks and Flash Events., , and . Int. J. Cyber Warf. Terror., 11 (4): 21-42 (2021)Ubiquitous Healthcare System: Architecture, Prototype Design and Experimental Evaluations., , , and . EAI Endorsed Trans. Scalable Inf. Syst., 9 (4): 6 (2022)