Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre., , , , , and . Secur. Commun. Networks, (2021)Admission control algorithm based on the effective bandwidth in vehicle-to-infrastructure communication., , , , and . IET Commun., 12 (6): 704-711 (2018)A novel free space communication system using nonlinear InGaAsP microsystem resonators for enabling power-control toward smart cities., , , , , and . Wirel. Networks, 26 (4): 2317-2328 (2020)A New Combinational Technique in Image Steganography., , , and . Int. J. Inf. Secur. Priv., 15 (3): 48-64 (2021)Machine-Learning-Based Spam Mail Detector., , , , , and . SN Comput. Sci., 4 (6): 858 (November 2023)Social Media and Steganography: Use, Risks and Current Status., , , and . IEEE Access, (2021)Approach for Collision Minimization and Enhancement of Power Allocation in WSNs., , , , , , and . J. Sensors, (2021)Cipher Block Chaining Support Vector Machine for Secured Decentralized Cloud Enabled Intelligent IoT Architecture., , , , , , and . IEEE Access, (2021)Automated Risk Management Based Software Security Vulnerabilities Management., , , , and . IEEE Access, (2022)A Novel Approach for Linguistic Steganography Evaluation Based on Artificial Neural Networks., , , , and . IEEE Access, (2021)