Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating the Role of Big Data in IIOT-Industrial Internet of Things for Executing Ranks Using the Analytic Network Process Approach., , , , and . Sci. Program., (2020)An Efficient Approach for the Detection and Prevention of Gray-Hole Attacks in VANETs., , , , and . IEEE Access, (2023)Review of Energy Storage System Technologies in Microgrid Applications: Issues and Challenges., , , , , and . IEEE Access, (2018)Energy load forecasting model based on deep neural networks for smart grids., and . Int. J. Syst. Assur. Eng. Manag., 11 (4): 824-834 (2020)Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges., , , , and . Complex., (2020)An Efficient Dynamic Solution for the Detection and Prevention of Black Hole Attack in VANETs., , , , and . Sensors, 22 (5): 1897 (2022)Task Priority-Based Cached-Data Prefetching and Eviction Mechanisms for Performance Optimization of Edge Computing Clusters., , , , , and . Secur. Commun. Networks, (2021)Modeling and simulation of IRES - engagement during the process of mRNA translation in cells infected with hepatitis C virus., , , , and . SCSC, page 852-857. Simulation Councils, Inc., (2007)Cluster-Based Antiphishing (CAP) Model for Smart Phones., and . Sci. Program., (2021)Authorization Model for Securing Cloud SaaS Services (Netflix)., , and . Int. J. Distributed Syst. Technol., 13 (8): 1-13 (2022)