Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multiconstrained QoS Aware MAC Protocol for Cluster-Based Cognitive Radio Sensor Networks., , , , , and . IJDSN, (2015)ConChain: A Scheme for Contention-free and Attack Resilient BlockChain., , , , and . CoRR, (2023)Blockchain-based automated and robust cyber security management., , , , , , , , and . J. Parallel Distributed Comput., (2022)Supporting Law-Enforcement to Cope with Blacklisted Websites: Framework and Case Study., and . CNS, page 181-189. IEEE, (2022)ConChain: A Scheme for Contention-Free and Attack Resilient BlockChain., , , , and . CCNC, page 1054-1055. IEEE, (2024)Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites., , , , and . ISI, page 1-6. IEEE, (2020)MRL-PoS: A Multi-agent Reinforcement Learning based Proof of Stake Consensus Algorithm for Blockchain., , , , and . CoRR, (2023)Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites., , , , and . CoRR, (2021)Characterizing the Landscape of COVID-19 Themed Cyberattacks and Defenses., , , , and . CoRR, (2021)MRL-PoS: A Multi-agent Reinforcement Learning based Proof of Stake Consensus Algorithm for Blockchain., , , , and . CCWC, page 409-413. IEEE, (2024)