Author of the publication

Cybersecurity for Battlefield of Things - A Comprehensive Review.

, , , , , and . J. Circuits Syst. Comput., 31 (17): 2230010:1-2230010:49 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimized Energy Efficient Secure Routing Protocol for Wireless Body Area Network., , , , , and . IEEE Access, (2021)Computational Modeling of Dementia Prediction Using Deep Neural Network: Analysis on OASIS Dataset., , and . IEEE Access, (2021)Video Index Point Detection and Extraction Framework Using Custom YoloV4 Darknet Object Detection Model., , , , , and . IEEE Access, (2021)An Improved Multi-Objective Particle Swarm Optimization Routing on MANET., , , , , and . Comput. Syst. Sci. Eng., 44 (2): 1187-1200 (2023)Image Enhancement Using Adaptive Fractional Order Filter., , , , , and . Comput. Syst. Sci. Eng., 45 (2): 1409-1422 (2023)Software Reliability Assessment Using Hybrid Neuro-Fuzzy Model., , , , , and . Comput. Syst. Sci. Eng., 41 (3): 891-902 (2022)A hybrid approach for medical images classification and segmentation to reduce complexity., , , , , and . Innov. Syst. Softw. Eng., 19 (1): 33-46 (March 2023)Spam message detection using Danger theory and Krill herd optimization., , , , , and . Comput. Networks, (2021)Analyzing and classifying MRI images using robust mathematical modeling., , , , and . Multim. Tools Appl., 81 (26): 37519-37540 (2022)ROI-Fuzzy Based Medical Data Authentication Scheme for Smart Healthcare System., , , , , and . IEEE Access, (2022)