Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security analysis of the constrained application protocol in the Internet of Things., , and . FGCT, page 163-168. IEEE, (2013)Intrusion Detection and Classification with Autoencoded Deep Neural Network., , , and . SecITC, volume 11359 of Lecture Notes in Computer Science, page 142-156. Springer, (2018)Continuous User Authentication Based on Deep Neural Networks., , and . UCET, page 1-4. IEEE, (2020)On demand-based frequency allocation to mitigate interference in Femto-Macro LTE cellular network., , , and . FGCT, page 213-218. IEEE, (2013)Implementing Fingerprint Recognition on One-Time Password Device to Enhance User Authentication., , and . CSS (2), volume 11983 of Lecture Notes in Computer Science, page 448-461. Springer, (2019)6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach., , , , and . Int. J. Commun. Syst., 25 (9): 1189-1212 (2012)A security framework for node-to-node communications based on the LISP architecture., , , and . Int. J. Electron. Secur. Digit. Forensics, 10 (3): 276-291 (2018)Instant Channel Allocation Technique to Improve System Throughput in Joint LTE Cellular Network., , , and . AINA Workshops, page 900-904. IEEE Computer Society, (2014)A Secure Framework for Communications in Heterogeneous Networks., , , and . AINA Workshops, page 841-846. IEEE Computer Society, (2014)A Formally Verified Device Authentication Protocol Using Casper/FDR., , , , and . TrustCom, page 1293-1298. IEEE Computer Society, (2012)