Author of the publication

MIDAS: A Multi-chain Interoperable Data and Access System for Healthcare.

, , , , and . CSoNet, volume 14479 of Lecture Notes in Computer Science, page 313-322. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security-Enhanced Monitoring System for Northbound Interface in SDN using Blockchain., , and . SoICT, page 197-204. ACM, (2019)B-DAC: A Decentralized Access Control Framework on Northbound Interface for Securing SDN Using Blockchain., , , , and . CoRR, (2021)B-DAC: A decentralized access control framework on Northbound interface for securing SDN using blockchain., , , , and . J. Inf. Secur. Appl., (2022)Mitigating Flow Table Overloading Attack with Controller-based Flow Filtering Strategy in SDN., , and . ICCNS, page 154-158. ACM, (2019)Shark-Eyes: A multimodal fusion framework for multi-view-based phishing website detection., , , , , , and . SoICT, page 793-800. ACM, (2023)Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique., , and . Clust. Comput., 22 (Suppl 1): 1055-1064 (2019)Cyber Threat Intelligence for Proactive Defense against Adversary in SDN-assisted IIoTs context., , , , , , and . RIVF, page 1-6. IEEE, (2022)Adversarial AutoEncoder and Generative Adversarial Networks for Semi-Supervised Learning Intrusion Detection System., , , , , and . RIVF, page 584-589. IEEE, (2022)DA-GAN: Domain Adaptation for Generative Adversarial Networks-assisted Cyber Threat Detection., , , , , and . RIVF, page 29-34. IEEE, (2022)A Software Defined Networking Approach for Guaranteeing Delay in Wi-Fi Networks., , , , , and . SoICT, page 191-196. ACM, (2019)