Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent Supply Chain Management., , , and . JSEA, 3 (4): 404-408 (2010)A Novel QoS-Oriented Intrusion Detection Mechanism for IoT Applications., , , , , and . Wirel. Commun. Mob. Comput., (2021)Distributed ledger technology based robust access control and real-time synchronization for consumer electronics., , , , , and . PeerJ Comput. Sci., (2021)A D2D assisted multi-hop data dissemination protocol for inter-UAV communication., , , , , and . Int. J. Commun. Syst., (2021)Nature-Inspired Gravitational Search-Guided Artificial Neural Key Exchange for IoT Security Enhancement., , , and . IEEE Access, (2021)Cipher Block Chaining Support Vector Machine for Secured Decentralized Cloud Enabled Intelligent IoT Architecture., , , , , , and . IEEE Access, (2021)A Novel Approach for Linguistic Steganography Evaluation Based on Artificial Neural Networks., , , , and . IEEE Access, (2021)A Pragmatic Ensemble Strategy for Missing Values Imputation in Health Records., , , , , and . Entropy, 24 (4): 533 (2022)ODPV: An Efficient Protocol to Mitigate Data Integrity Attacks in Intelligent Transport Systems., , , , , , and . IEEE Access, (2020)A Novel QoS Prediction Model for Web Services Based on an Adaptive Neuro-Fuzzy Inference System Using COOT Optimization., , , , , , , and . IEEE Access, (2024)