Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DDoS Attack Detection System: Utilizing Classification Algorithms with Apache Spark., , and . NTMS, page 1-7. IEEE, (2018)Lightweight protocol for anonymity and mutual authentication in RFID systems., , and . CCNC, page 910-915. IEEE, (2015)Backward connection preemption in multiclass QoS-aware networks., and . IWQoS, page 153-160. IEEE, (2004)Design and Analysis of a Generalized Architecture for Reconfigurable m-ary Tree Structures., and . IEEE Trans. Computers, 41 (11): 1465-1478 (1992)A mobile role-based access control system using identity-based encryption with zero knowledge proof., , and . CISDA, page 1-7. IEEE, (2012)Test Suite for Vulnerability Analysis of RFID Systems., , , , , , , and . ICWN, page 70-75. CSREA Press, (2010)Further Improvements of Fast Encryption Algoirthm for Multimedia., and . Int. J. Netw. Secur., 7 (2): 187-192 (2008)A Quantum-Based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networks., , , and . Symmetry, 14 (8): 1625 (2022)Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model With Majority Vote Ensemble Algorithm., , , and . IEEE Trans. Netw. Sci. Eng., 8 (3): 2559-2574 (2021)An Evaluation of SingleTapBraille Keyboard: A Text Entry Method that Utilizes Braille Patterns on Touchscreen Devices., and . ASSETS, page 161-169. ACM, (2016)