Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Evaluation of No-Pairing ECC-Based KPABE on IoT Platforms., , , , and . ICIoT, page 225-230. IEEE, (2020)Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing., , , , , and . Big Data, 9 (4): 265-278 (2021)Safety Score as an Evaluation Metric for Machine Learning Models of Security Applications., , , and . IEEE Netw. Lett., 2 (4): 207-211 (2020)Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach., , , , , and . Appl. Soft Comput., (2022)Security concerns on machine learning solutions for 6G networks in mmWave beam prediction., , , , and . Phys. Commun., (2022)BlueTack.. (January 2021)Mobile Authentication Secure against Man-in-the-Middle Attacks., , , and . MobileCloud, page 273-276. IEEE Computer Society, (2014)A formal role-based access control model for security policies in multi-domain mobile networks., and . Comput. Networks, 57 (1): 330-350 (2013)Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study., , , , and . IEEE Access, (2020)Factors Affecting the Performance of Sub-1 GHz IoT Wireless Networks., , , and . Wirel. Commun. Mob. Comput., (2021)