Author of the publication

Forensic investigation to detect forgeries in ASF files of contemporary IP cameras.

, , , , , , and . J. Supercomput., 74 (10): 5060-5081 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AdS: An adaptive spectrum sensing technique for survivability under jamming attack in Cognitive Radio Networks., , , and . Comput. Commun., (2021)An evolutionary game theoretic framework for coexistence in Cognitive Radio Networks., , , and . GlobalSIP, page 278-282. IEEE, (2014)Security Assessment and Evaluation of VPNs: A Comprehensive Survey., , , , , , , , , and . ACM Comput. Surv., 55 (13s): 273:1-273:47 (2023)Inducing Cooperation for Optimal Coexistence in Cognitive Radio Networks: A Game Theoretic Approach., , and . MILCOM, page 955-961. IEEE, (2014)On the Efficiency of Software Implementations of Lightweight Block Ciphers from the Perspective of Programming Languages., , , , and . IACR Cryptology ePrint Archive, (2019)An evolutionary routing game for energy balance in Wireless Sensor Networks., , , and . Comput. Networks, (2018)Forensic investigation to detect forgeries in ASF files of contemporary IP cameras., , , , , , and . J. Supercomput., 74 (10): 5060-5081 (2018)AndroKit: A toolkit for forensics analysis of web browsers on android platform., , , , , and . Future Gener. Comput. Syst., (2019)User-side Wi-Fi Evil Twin Attack detection using SSL/TCP protocols., , , and . CCNC, page 239-244. IEEE, (2015)CACS: A Context-Aware and Anonymous Communication Framework for an Enterprise Network Using SDN., , , , , , and . IEEE Internet Things J., 9 (14): 11725-11736 (2022)