Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Environmental IoT Data Using Masked Authentication Messaging Protocol in a DAG-Based Blockchain: IOTA Tangle., , , , , and . Future Internet, 13 (12): 312 (2021)Cloudlet-enabled wireless body area networks (WBANs): a systematic review, architecture, and research directions for QoS improvement., , , , and . Int. J. Syst. Assur. Eng. Manag., 13 (4): 1531-1555 (2022)Design and Implementation of a Blockchain-Enabled Secure Sensing Data Processing and Logging System., , and . SMC, page 386-391. IEEE, (2021)File integrity monitoring tools: Issues, challenges, and solutions., , and . Concurr. Comput. Pract. Exp., (2020)Machine Learning Approach for Malware Detection Using Random Forest Classifier on Process List Data Structure., , , , and . ICISDM, page 98-102. ACM, (2018)Design of Virtualization Framework to Detect Cyber Threats in Linux Environment., , , , and . CSCloud, page 316-320. IEEE Computer Society, (2017)A Blockchain-Facilitated Secure Sensing Data Processing and Logging System., , , , , and . IEEE Access, (2023)Windows Virtualization Architecture For Cyber Threats Detection., , , and . ICDIS, page 119-122. IEEE, (2018)Robotic Exoskeleton Design and System Control for Glovebox Operators in Nuclear Facilities., , , , , , and . SII, page 509-512. IEEE, (2020)Hierarchical Tactile Sensation Integration from Prosthetic Fingertips Enables Multi-Texture Surface Recognition., , , , , , and . Sensors, 21 (13): 4324 (2021)