Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain: Can It Be Trusted?, and . Computer, 53 (4): 31-35 (2020)A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks, and Remedies., and . Int. J. Commun. Networks Inf. Secur., (2013)Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies., , and . Int. J. Commun. Networks Inf. Secur., (2018)Cyber Security Concerns in Social Networking Service., , , and . Int. J. Commun. Networks Inf. Secur., (2020)A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic., and . Connect. Sci., 33 (3): 532-554 (2021)Advances in Cognitive Radio Sensor Networks., , , , and . Int. J. Distributed Sens. Networks, (2014)Prioritized heterogeneous traffic-oriented congestion control protocol for WSNs., , , and . Int. Arab J. Inf. Technol., 9 (1): 39-48 (2012)Accurate modeling of VoIP traffic QoS parameters in current and future networks with multifractal and Markov models., , and . Math. Comput. Model., 57 (11-12): 2832-2845 (2013)Information integrity in smart grid systems., , , , and . Inf. Syst., (2015)An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks., , , and . KSII Trans. Internet Inf. Syst., 2 (5): 265-279 (2008)