Author of the publication

Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp.

, , , and . Wirel. Pers. Commun., 112 (4): 2533-2556 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Agent-based Design Pattern for Decoupling Views of E-business System., and . CITA, page 93-100. (2003)F-IDS: A Technique for Simplifying Evidence Collection in Network Forensics., and . ICSECS (3), volume 181 of Communications in Computer and Information Science, page 693-701. Springer, (2011)A Secure Storage Model to Preserve Evidence in Network Forensics., and . ICSECS (2), volume 180 of Communications in Computer and Information Science, page 391-402. Springer, (2011)A Framework for Optimizing Malware Classification by Using Genetic Algorithm., and . ICSECS (2), volume 180 of Communications in Computer and Information Science, page 58-72. Springer, (2011)SLA-based complementary approach for network intrusion detection., , and . Comput. Commun., 34 (14): 1738-1749 (2011)Multi-Behavior RFM Model Based on Improved SOM Neural Network Algorithm for Customer Segmentation., , , and . IEEE Access, (2022)Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks., , , , , , , , , and 2 other author(s). IEEE Access, (2022)Towards Understanding the Challenges of Data Remanence in Cloud Computing: A Review., , , , , and . ACeS, volume 1347 of Communications in Computer and Information Science, page 495-507. Springer, (2020)A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems., , , , , and . IEEE Access, (2019)Real-Time Detection of Intrusive Traffic in QoS Network Domains., , and . IEEE Secur. Priv., 11 (6): 45-53 (2013)