Author of the publication

Securing Smart Contracts in Fog Computing: Machine Learning-Based Attack Detection for Registration and Resource Access Granting.

, , , , , , and . IEEE Access, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Personalization of Peer Review in Learning Programming., , , and . SETE@ICWL, volume 10108 of Lecture Notes in Computer Science, page 270-277. Springer, (2016)LOCALI: Calibration-Free Systematic Localization Approach for Indoor Positioning., , and . Sensors, 17 (6): 1213 (2017)Evaluating Indoor Positioning Systems in a Shopping Mall: The Lessons Learned From the IPIN 2018 Competition., , , , , , , , , and 51 other author(s). IEEE Access, (2019)The IPIN 2019 Indoor Localisation Competition - Description and Results., , , , , , , , , and 76 other author(s). IEEE Access, (2020)Wi-Fi-Based Effortless Indoor Positioning System Using IoT Sensors., , and . Sensors, 19 (7): 1496 (2019)MagWi: Benchmark Dataset for Long Term Magnetic Field and Wi-Fi Data Involving Heterogeneous Smartphones, Multiple Orientations, Spatial Diversity and Multi-Floor Buildings., , , , , and . IEEE Access, (2021)Enhanced Security in Cloud Computing Using Neural Network and Encryption., , , , and . IEEE Access, (2021)Zeroes and Fixed Points of Different Functions via Contraction Type Conditions., , and . ECONVN, volume 760 of Studies in Computational Intelligence, page 353-359. Springer, (2018)Best Proximity Point Theorems for Generalized α - ψ -Proximal Contractions., , , and . ECONVN, volume 760 of Studies in Computational Intelligence, page 341-352. Springer, (2018)Best Proximity Point Results for γ-Controlled Proximal Contraction., , , and . IEEE Access, (2019)