Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet of Intelligent Vehicles (IoIV): An Intelligent VANET Based Computing via Predictive Modeling., , and . IEEE Access, (2023)A Novel Delay Constraint Location Privacy Scheme in VANETs., , , and . VTC Fall, page 1-5. IEEE, (2017)The ingenuity of malware substitution: Bypassing next-generation Antivirus., , and . ICAC, page 1-5. IEEE, (2021)Risk Assessment of SCADA Cyber Attack Methods: A Technical Review on Securing Automated Real-time SCADA Systems., , , , and . ICAC, page 1-6. IEEE, (2022)Complex Adaptive Systems: A Data Modelling and Engineering Perspective., , , and . ICISDM, page 44-48. ACM, (2018)The framework for efficient passphrase-based multifactor authentication in cloud computing., , and . ICAC, page 37-41. IEEE, (2016)A Novel Model for HD video calling in 5G Networks., , , , and . ICAC, page 1-6. IEEE, (2019)ScreenStealer: Addressing Screenshot attacks on Android devices., and . ICAC, page 336-341. IEEE, (2016)A methodology to characterize and compute correlation between traffic congestion and health issues via social media., , , and . ICAC, page 1-6. IEEE, (2018)EK-Healthcare: Effectiveness of IoT in the Medical Field with Enhanced Features., and . ICAC, page 1-6. IEEE, (2018)