Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network intrusion detection system: A systematic study of machine learning and deep learning approaches., , , , and . Trans. Emerg. Telecommun. Technol., (2021)Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET., , , , and . Sensors, 19 (22): 4954 (2019)A graph-theoretic approach for the detection of phishing webpages., , , , , and . Comput. Secur., (2020)Blockchain-Based Lightweight Multifactor Authentication for Cell-Free in Ultra-Dense 6G-Based (6-CMAS) Cellular Network., , , , , , , and . IEEE Access, (2023)Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks., , , , , , , and . IEEE Access, (2022)A Spectrogram Image-Based Network Anomaly Detection System Using Deep Convolutional Neural Network., , , and . IEEE Access, (2021)Blended system thinking approach to strengthen the education and training in university-industry research collaboration., , , , and . Technol. Anal. Strateg. Manag., 34 (4): 447-460 (2022)Analyzing the Role of Human Capital in Strengthening National Innovation System Through University-Industry Research Collaboration: A TRIZ-Based Approach., , , and . TFC, volume 655 of IFIP Advances in Information and Communication Technology, page 417-428. Springer, (2022)Designing 3D prosthetic templates for maxillofacial defect rehabilitation: A comparative analysis of different virtual workflows., , , , , and . Comput. Biol. Medicine, (2020)NURBS curves with the application of multiple bones fracture reconstruction., , , , and . Appl. Math. Comput., (2017)