Author of the publication

Secure the 5G and Beyond Networks with Zero Trust and Access Control Systems for Cloud Native Architectures.

, , , , , , , , and . AICCSA, page 1-8. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compressed Sensing for Security and Payload Enhancement in Digital Audio Steganography., , , , , and . J. Inf. Hiding Multim. Signal Process., 9 (6): 1506-1517 (2018)Modelling, simulation, and optimization of diabetes type II prediction using deep extreme learning machine., , , , , , and . J. Ambient Intell. Smart Environ., 12 (2): 125-138 (2020)Secure IoMT for Disease Prediction Empowered With Transfer Learning in Healthcare 5.0, the Concept and Case Study., , , , , , , , , and . IEEE Access, (2023)Probing a Hybrid Channel for the Dynamics of Non-Local Features., , , and . Symmetry, 15 (12): 2189 (December 2023)Cyber Threat Intelligence for Secure Smart City., , , and . CoRR, (2020)Quantum memory-assisted entropic uncertainty and entanglement dynamics: two qubits coupled with local fields and Ornstein Uhlenbeck noise., , , , and . Quantum Inf. Process., 21 (10): 354 (2022)Adaptive resource allocation for OFDM systems using fuzzy rule base system water-filling principle and product codes., , and . ISDA, page 805-810. IEEE, (2012)Adaptive communication using softcomputing techniques., , , and . SoCPaR, page 19-24. IEEE, (2013)Kerberos Implementation in Manets., , , and . SECRYPT, page 161-166. INSTICC Press, (2008)Efficient link adaptation in OFDM systems using a hybrid intelligent technique., , , and . HIS, page 12-17. IEEE, (2013)