Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Approach Combining Rule-Based and Anomaly-Based Detection Against DDoS Attacks, and . International Journal of Network Security & Its Applications, 8 (8): 1-18 (September 2016)Robot Identification and Authentication in a Robot Cloud Service System., , , and . IEEE Access, (2018)Improve Two Remote User Authentication Scheme Using Smart Card., , and . BWCCA, page 404-407. IEEE, (2013)An Agreement Under Early Stopping and Fault Diagnosis Protocol in a Cloud Computing Environment., , and . IEEE Access, (2018)A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System., , , , and . IEEE Access, (2020)An Improved Network Traffic Classification Model Based on a Support Vector Machine., , , , , and . Symmetry, 12 (2): 301 (2020)A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test.. J. Univers. Comput. Sci., 15 (2): 488-504 (2009)A Traceable Online Will System Based on Blockchain and Smart Contract Technology., , , , , and . Symmetry, 13 (3): 466 (2021)A Traceable Firearm Management System Based on Blockchain and IoT Technology., , , , , and . Symmetry, 13 (3): 439 (2021)Special Issue: Symmetric and Asymmetric Encryption in Blockchain., , , and . Symmetry, 15 (2): 458 (February 2023)