Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Behavioural Monitoring and Security Profiling in the Internet of Things (IoT)., , , , , , and . HPCC/DSS/SmartCity/DependSys, page 1203-1210. IEEE, (2021)Internet of Things (IoT) security dataset evolution: Challenges and future directions., , , , , , , , and . Internet Things, (July 2023)A study of EEG for enterprise multimedia security., , and . Multim. Tools Appl., 79 (15-16): 10805-10823 (2020)A Novel framework of EEG-based user identification by analyzing music-listening behavior., , and . Multim. Tools Appl., 76 (24): 25581-25602 (2017)Verification Based Scheme to Restrict IoT Attacks., , , , , and . BDCAT, page 63-68. ACM, (2021)Threshold based Technique to Detect Anomalies using Log Files., , , and . ICMLT, page 191-198. ACM, (2022)Impact of Ageing on EEG Based Biometric Systems., , , and . ACPR, page 459-464. IEEE Computer Society, (2017)Fusion of Neuro-Signals and Dynamic Signatures for Person Authentication., , , , and . Sensors, 19 (21): 4641 (2019)Age and gender classification using brain-computer interface., , and . Neural Comput. Appl., 31 (10): 5887-5900 (2019)Kinect sensor-based interaction monitoring system using the BLSTM neural network in healthcare., , , , , and . Int. J. Mach. Learn. Cybern., 10 (9): 2529-2540 (2019)