Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Investigation on Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset and Its Effectiveness., , and . CoRR, (2022)Analyzing Security and Privacy Concerns of Contact Tracing Applications., , and . ICDH, page 283-292. IEEE, (2021)Framework for Collecting Data from specialized IoT devices - An application to enhance Healthcare Systems., , , , , and . ICDH, page 231-233. IEEE, (2021)A Statistical Summary Analysis of Window-Based Extracted Features for EEG Signal Classification., , , and . ICDH, page 293-298. IEEE, (2021)Mitigating distributed denial of service attacks at the application layer., , and . SAC, page 693-696. ACM, (2017)Security Risk and Attacks in AI: A Survey of Security and Privacy., , , , , and . COMPSAC, page 1834-1839. IEEE, (2023)Understanding Rural women's Experience in STEM and Non-STEM field in Bangladesh., , and . COMPSAC, page 1037-1046. IEEE, (2023)Mental Health Analysis During Pandemic: A Survey of Detection and Treatment., , , , and . COMPSAC, page 1530-1538. IEEE, (2023)Quantum Machine Learning in Disease Detection and Prediction: a survey of applications and future possibilities., , , , , , and . COMPSAC, page 1545-1551. IEEE, (2023)Cardiovascular Health Management Compliance with Health Insurance Portability and Accountability Act., , , and . COMPSAC, page 1423-1428. IEEE, (2023)