Author of the publication

A Hybrid Cryptographic Mechanism for Secure Data Transmission in Edge AI Networks.

, , , and . Int. J. Comput. Intell. Syst., 17 (1): 24 (December 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model., , , and . Symmetry, 12 (5): 754 (2020)Deep Ensemble Fake News Detection Model Using Sequential Deep Learning Technique., , , , and . Sensors, 22 (18): 6970 (2022)A Hybrid Cryptographic Mechanism for Secure Data Transmission in Edge AI Networks., , , and . Int. J. Comput. Intell. Syst., 17 (1): 24 (December 2024)Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique., , , , , and . Comput. Syst. Sci. Eng., 44 (1): 859-872 (2023)Novel Component-Based Development Model for SIP-Based Mobile Application (1202)., , , and . CoRR, (2012)A Comprehensive Study of Commonly Practiced Heavy and Light Weight Software Methodologies, , and . CoRR, (2011)An asymmetric CPW-fed modified bow tie-shaped antenna with parasitic elements for ultra-wideband applications., , , , and . Int. J. Commun. Syst., (2022)Key Issues in Healthcare Data Integrity: Analysis and Recommendations., , , , , , and . IEEE Access, (2020)An Integrated Approach of Fuzzy Logic, AHP and TOPSIS for Estimating Usable-Security of Web Applications., , , , , and . IEEE Access, (2020)Mobile Deep Learning: Exploring Deep Neural Network for Predicting Context-Aware Smartphone Usage., , , , and . SN Comput. Sci., 2 (3): 146 (2021)