Author of the publication

Traffic data extraction and labeling for machine learning based attack detection in IoT networks.

, , and . Int. J. Mach. Learn. Cybern., 14 (7): 2317-2332 (July 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptographic Reverse Firewalls for Identity-Based Encryption., , , and . FCS, volume 1105 of Communications in Computer and Information Science, page 36-52. Springer, (2019)An efficient certificateless deniable authentication protocol without pairings., , , and . Int. J. Electron. Secur. Digit. Forensics, 7 (2): 179-196 (2015)On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing., , , and . Int. J. Netw. Secur., 17 (2): 129-134 (2015)Provably secure and efficient certificateless authenticated tripartite key agreement protocol., , and . Math. Comput. Model., 55 (3-4): 1213-1221 (2012)Security analysis and improvements on a semi-quantum electronic voting protocol., , , , and . IACR Cryptol. ePrint Arch., (2024)HAP-SG: Heterogeneous authentication protocol for smart grid., and . Peer Peer Netw. Appl., 16 (3): 1365-1379 (May 2023)Certificateless deniably authenticated encryption and its application to e-voting system., , and . Telecommun. Syst., 70 (3): 417-434 (2019)Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings., and . Comput. J., 58 (10): 2636-2648 (2015)Practical Signcryption for Secure Communication of Wireless Sensor Networks., , and . Wireless Personal Communications, 89 (4): 1391-1412 (2016)Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test., , , , , and . IEEE Access, (2018)