Author of the publication

BRC-KEP: A secure biometric and reversible CA based 2-party key exchange protocol.

, , , and . IC3, page 1-6. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Surveying Port Scans and Their Detection Methodologies., , and . Comput. J., 54 (10): 1565-1581 (2011)SURE-H: A Secure IoT Enabled Smart Home System., , and . WF-IoT, page 59-63. IEEE, (2019)Cformer: Semi-Supervised Text Clustering Based on Pseudo Labeling., , , and . CIKM, page 3078-3082. ACM, (2021)Towards a Workload Mapping Model for Tuning Backing Services in Cloud Systems., , and . DEXA (1), volume 14146 of Lecture Notes in Computer Science, page 266-280. Springer, (2023)ADCluster: Adaptive Deep Clustering for Unsupervised Learning from Unlabeled Documents., , , and . ICNLSP, page 68-77. Association for Computational Linguistics, (2023)NADO: network anomaly detection using outlier approach., , and . ICCCS, page 531-536. ACM, (2011)Identification and Classification of Cyberbullying Posts: A Recurrent Neural Network Approach Using Under-Sampling and Class Weighting., , , , , and . ICONIP (5), volume 1333 of Communications in Computer and Information Science, page 113-120. Springer, (2020)Anomaly Detection and Resolution on the Edge: Solutions and Future Directions., , and . SOSE, page 227-238. IEEE, (2023)Few-Shot Anomaly Detection in Text with Deviation Learning., , , and . ICONIP (2), volume 14448 of Lecture Notes in Computer Science, page 425-438. Springer, (2023)Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling Approach., , and . ARES, page 20:1-20:10. ACM, (2021)