Author of the publication

IMPACT: Impersonation Attack Detection via Edge Computing Using Deep Autoencoder and Feature Abstraction.

, , , , , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancement of Key Derivation in Web Service Security - Performance Bottleneck in Real-Time Messaging Systems., , , and . Wireless Personal Communications, 97 (4): 5171-5184 (2017)New Two-Level µTESLA Protocol for IoT Environments., , and . SERVICES, page 84-91. IEEE, (2019)Recent advances of smart glass application security and privacy., and . ICITST, page 65-69. IEEE, (2015)Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison.. IMACC, volume 1746 of Lecture Notes in Computer Science, page 307-. Springer, (1999)IMPACT: Impersonation Attack Detection via Edge Computing Using Deep Autoencoder and Feature Abstraction., , , , , , and . IEEE Access, (2020)New mutual agreement protocol to secure mobile RFID-enabled devices., , and . Inf. Secur. Tech. Rep., 13 (3): 151-157 (2008)A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication., , , , and . Int. J. Commun. Syst., 24 (4): 461-472 (2011)A Novel Implementation of an AI-Based Smart Construction Safety Inspection Protocol in the UAE., , , , , , and . IEEE Access, (2021)Enhanced Inf-TESLA Protocol: A Continuous Connectivity and Low Overhead Authentication Protocol via IoT Devices., , , , , and . IEEE Access, (2022)Novel microscale memristor with uniqueness property for securing communications., , , , , and . MWSCAS, page 1-4. IEEE, (2016)