Author of the publication

Security and privacy attacks during data communication in Software Defined Mobile Clouds.

, , and . Comput. Commun., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

L-RPL: RPL powered by laplacian energy for stable path selection during link failures in an Internet of Things network., , , and . Comput. Networks, (2021)Attribute Selection Hybrid Network Model for risk factors analysis of postpartum depression using Social media., , , , , , and . Brain Informatics, 10 (1): 28 (December 2023)EODC: An Energy Optimized Dynamic Clustering Protocol for Wireless Sensor Network using PSO approach., and . Int. J. Comput. Commun. Control, 14 (2): 183-198 (2019)A New Deep Convolutional Neural Network Model for Automated Breast Cancer Detection., , , , , , , and . BESC, page 1-4. IEEE, (2020)An energy efficient cluster based routing approach to minimize energy consumption using CORP in wireless sensor networks., , , and . J. Intell. Fuzzy Syst., 36 (6): 5835-5844 (2019)Trust-based backpressure routing in wireless sensor networks., , , and . Int. J. Sens. Networks, 17 (1): 27-39 (2015)Enhancing Whale Optimization Algorithm with Levy Flight for coverage optimization in wireless sensor networks., and . Comput. Electr. Eng., (2021)Security and privacy attacks during data communication in Software Defined Mobile Clouds., , and . Comput. Commun., (2020)An attribute-based lightweight cloud data access control using hypergraph structure., , and . J. Supercomput., 76 (8): 6040-6064 (2020)Two-stage data encryption using chaotic neural networks., , , , and . J. Intell. Fuzzy Syst., 38 (3): 2561-2568 (2020)