Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Insider Threats: Solutions and Trends., , , and . Inf. Secur. J. A Glob. Perspect., 21 (4): 183-192 (2012)Cross-Layer Support for Energy Efficient Routing in Wireless Sensor Networks., , , and . J. Sensors, (2009)Misinformation Detection Using Deep Learning., and . IT Prof., 25 (5): 57-63 (September 2023)A secure multipath reactive protocol for routing in IoT and HANETs., , , , , and . Ad Hoc Networks, (2020)Cloud-Assisted Context-Aware Vehicular Cyber-Physical System for PHEVs in Smart Grid., , , , and . IEEE Syst. J., 11 (1): 140-151 (2017)Anonymous Authentication for Wireless Body Area Networks With Provable Security., , , and . IEEE Syst. J., 11 (4): 2590-2601 (2017)Vulnerabilities to Online Social Network Identity Deception Detection Research and Recommendations for Mitigation., , and . Future Internet, 12 (9): 148 (2020)Fog Computing Architecture, Evaluation, and Future Research Directions., , and . IEEE Commun. Mag., 56 (5): 46-52 (2018)Machine learning and data analytics for the IoT., , , and . Neural Comput. Appl., 32 (20): 16205-16233 (2020)An Improved Privacy Solution for the Smart Grid., and . Int. J. Netw. Secur., 18 (3): 529-537 (2016)