Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital forensics cloud log unification: Implementing CADF in Apache CloudStack., , , and . J. Inf. Secur. Appl., (2020)Cybersecurity Challenges in the Maritime Sector., , , , and . Network, 2 (1): 123-138 (2022)A novel approach for performance-based clustering and anagement of network traffic flows., , , and . IWCMC, page 2025-2030. IEEE, (2019)LIMAP: A Lightweight Multilayer Authentication Protocol for WBAN., , , , , and . Wirel. Pers. Commun., 121 (4): 2857-2884 (2021)BotSpot: Deep Learning Classification of Bot Accounts within Twitter., , , , and . CoRR, (2021)A Novel Multimodal Biometric Authentication System using Machine Learning and Blockchain., , , and . CoRR, (2021)SoMIAP: Social media images analysis and prediction framework., , , and . CoRR, (2021)Insider Detection using Deep Autoencoder and Variational Autoencoder Neural Networks., , , and . CoRR, (2021)Comparative Analysis of Cryptographic Key Management Systems., , and . CoRR, (2021)FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management., , , and . Comput. Secur., (2019)