Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced Metamorphic Techniques-A Case Study Against Havex Malware., , , , and . IEEE Access, (2021)Hand-based multibiometric systems: state-of-the-art and future challenges., , , , , and . PeerJ Comput. Sci., (2021)A social qualitative trust framework for Fog computing., , , , and . Comput. Electr. Eng., (2022)Revolutionizing Data Center Networks: Dynamic Load Balancing via Floodlight in SDN Environment., , , , , , , and . ICACS, page 1-8. IEEE, (2024)Verifiable Privacy-Preserving Image Retrieval in Multi-Owner Multi-User Settings., , and . IEEE Trans. Emerg. Top. Comput. Intell., 8 (2): 1640-1655 (April 2024)The reality of backdoored S-Boxes - An eye opener., , , , and . J. Inf. Secur. Appl., (February 2024)Forensic Analysis of Social Networking Applications on an Android Smartphone., , , , , and . Wirel. Commun. Mob. Comput., (2021)Privacy and security federated reference architecture for Internet of Things., , , , , and . Frontiers Inf. Technol. Electron. Eng., 24 (4): 481-508 (2023)Enterprise Integration Patterns in SDN: A Reliable, Fault-Tolerant Communication Framework., , , , and . IEEE Internet Things J., 8 (8): 6359-6371 (2021)On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions., , and . PeerJ Comput. Sci., (2021)