Author of the publication

A review study on blockchain-based IoT security and forensics.

, , and . Multim. Tools Appl., 80 (30): 36183-36214 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel deep autoencoder based survival analysis approach for microarray dataset., , , and . PeerJ Comput. Sci., (2021)An efficient multi-factor authentication scheme based CNNs for securing ATMs over cognitive-IoT., , , and . PeerJ Comput. Sci., (2021)Homomorphic image watermarking with a singular value decomposition algorithm., , , , , , , , , and . Inf. Process. Manag., 50 (6): 909-923 (2014)Enhancing the Image Transmission over Wireless Networks through a Novel Interleaver., , , , , , and . KSII Trans. Internet Inf. Syst., 5 (9): 1528-1543 (2011)An SVD audio watermarking approach using chaotic encrypted images., , , , , , , , , and 1 other author(s). Digit. Signal Process., 21 (6): 764-779 (2011)Efficient machine learning model for predicting drug-target interactions with case study for Covid-19., , , and . Comput. Biol. Chem., (2021)Intelligence Is beyond Learning: A Context-Aware Artificial Intelligent System for Video Understanding., , , and . Comput. Intell. Neurosci., (2020)Buffering_Slotted_ALOHA protocol for underwater acoustic sensor networks based on the slot status., , , , and . Wirel. Networks, 27 (5): 3127-3145 (2021)An effective approach for authentication of mobile users., , and . VTC Spring, page 598-601. IEEE, (2002)Quality of service investigation for multimedia transmission over UWB networks., , and . COMSWARE, page 188-191. IEEE, (2008)