Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain in Cybersecurity Realm: An Overview., , , and . Blockchain Cybersecurity, Trust and Privacy, volume 79 of Advances in Information Security, Springer, (2020)Public Blockchains Scalability: An Examination of Sharding and Segregated Witness., , , , , and . Blockchain Cybersecurity, Trust and Privacy, volume 79 of Advances in Information Security, Springer, (2020)MVFCC: A Multi-View Fuzzy Consensus Clustering Model for Malware Threat Attribution., , , and . IEEE Access, (2020)Machine Learning Research Towards Combating COVID-19: Virus Detection, Spread Prevention, and Medical Assistance., , , , , , , , and . CoRR, (2020)Blockchain Applications for Industry 4.0 and Industrial IoT: A Review., , , and . IEEE Access, (2019)Enabling Drones in the Internet of Things With Decentralized Blockchain-Based Security., , , , , and . IEEE Internet Things J., 8 (8): 6406-6415 (2021)Green communication in IoT networks using a hybrid optimization algorithm., , , , , and . Comput. Commun., (2020)Secure Intelligent Fuzzy Blockchain Framework: Effective Threat Detection in IoT Networks., , , , and . Comput. Ind., (2023)Big Data Forensics: Hadoop Distributed File Systems as a Case Study., , , , , and . Handbook of Big Data and IoT Security, Springer, (2019)Industrial Big Data Analytics: Challenges and Opportunities., , , , and . Handbook of Big Data Privacy, Springer, (2020)