Author of the publication

An enhanced secure delegation-based anonymous authentication protocol for PCSs.

, , , and . Int. J. Commun. Syst., (August 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Improving Confidence in Autonomous Vehicle Software: A Study on Traffic Sign Recognition Systems., , , , and . Computer, 54 (8): 66-76 (2021)A Conceptual Framework to Incorporate Complex Basic Events in HiP-HOPS., , , , and . IMBSA, volume 11842 of Lecture Notes in Computer Science, page 109-124. Springer, (2019)Machine Learning for Botnet Detection: An Optimized Feature Selection Approach., , , and . ICFNDS, page 195-200. ACM, (2021)An enhanced secure delegation-based anonymous authentication protocol for PCSs., , , and . Int. J. Commun. Syst., (August 2023)Unsupervised Learning for Feature Selection: A Proposed Solution for Botnet Detection in 5G Networks., , , and . IEEE Trans. Ind. Informatics, 19 (1): 921-929 (2023)A Model-Based Reliability Analysis Method Using Bayesian Network., and . UKCI, volume 1409 of Advances in Intelligent Systems and Computing, page 483-495. Springer, (2021)Challenges with Providing Reliability Assurance for Self-Adaptive Cyber-Physical Systems., , , , , , and . ICSRS, page 394-399. IEEE, (2022)Latent Dirichlet Allocation for the Detection of Multi-Stage Attacks., , , and . ACIT, page 1-7. IEEE, (2023)A Hybrid Modular Approach for Dynamic Fault Tree Analysis., , , , and . IEEE Access, (2020)A Method for Temporal Fault Tree Analysis Using Intuitionistic Fuzzy Set and Expert Elicitation., , , , and . IEEE Access, (2020)