Author of the publication

Covert channel-internal control protocols: attacks and defense.

, , , , and . Secur. Commun. Networks, 9 (15): 2986-2997 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UNIConv: An enhanced U-Net based InceptionV3 convolutional model for DR semantic segmentation in retinal fundus images., and . Concurr. Comput. Pract. Exp., (2022)Deep transfer learning-based automated detection of blast disease in paddy crop., , , and . Signal Image Video Process., 18 (1): 569-577 (February 2024)Edge Friendly Labelings of Graph - I., and . Ars Comb., (2016)A Ultimate Approach of Mitigating Attacks in RPL Based Low Power Lossy Networks.. CoRR, (2019)IoT Blockchain Solution for Air Quality Monitoring in SmartCities., , and . CoRR, (2020)Contextual Beamforming: Exploiting Location and AI for Enhanced Wireless Telecommunication Performance., , , , , , and . CoRR, (2023)Exploring the Impact of Gamification Elements in Brand Apps on the Purchase Intention of Consumers., , , and . J. Glob. Inf. Manag., 31 (1): 1-30 (2023)Selecting Lung Cancer Patients from UK Primary Care Data: A Longitudinal Study of Feature Trends., , , , , , , , and . AII, page 43-59. (2021)Detecting anomalies in BACnet network data., , and . Sicherheit, volume P-256 of LNI, page 253-264. GI, (2016)Fitting Membrane Resistance in Single Cardiac Myocytes reduces Variability in Parameters., , and . CinC, page 209-212. www.cinc.org, (2014)