From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices., , , и . Int. J. Autom. Comput., 13 (4): 350-363 (2016)Vehicle-Life Interaction in Fog-Enabled Smart Connected and Autonomous Vehicles., , , , , и . IEEE Access, (2021)Internet of Intelligent Vehicles (IoIV): An Intelligent VANET Based Computing via Predictive Modeling., , и . IEEE Access, (2023)Hybrid Task Coordination Using Multi-Hop Communication in Volunteer Computing-Based VANETs., , , , и . Sensors, 21 (8): 2718 (2021)A Novel Delay Constraint Location Privacy Scheme in VANETs., , , и . VTC Fall, стр. 1-5. IEEE, (2017)The ingenuity of malware substitution: Bypassing next-generation Antivirus., , и . ICAC, стр. 1-5. IEEE, (2021)Risk Assessment of SCADA Cyber Attack Methods: A Technical Review on Securing Automated Real-time SCADA Systems., , , , и . ICAC, стр. 1-6. IEEE, (2022)Complex Adaptive Systems: A Data Modelling and Engineering Perspective., , , и . ICISDM, стр. 44-48. ACM, (2018)The framework for efficient passphrase-based multifactor authentication in cloud computing., , и . ICAC, стр. 37-41. IEEE, (2016)A Novel Model for HD video calling in 5G Networks., , , , и . ICAC, стр. 1-6. IEEE, (2019)