Author of the publication

Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation for Security Applications.

, , , , , , and . IEEE Access, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

In-Home Floor Based Sensor System-Smart Carpet- to Facilitate Healthy Aging in Place (AIP)., and . IEEE Access, (2020)A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks., , , and . J. Inf. Secur. Appl., (2022)Energy Consumption and Carbon Emissions Data Analysis: Case Study and Future Predictions., , , , , and . ANT/EDI40, volume 220 of Procedia Computer Science, page 616-623. Elsevier, (2023)Cyber Security Attacks on Smart Cities and Associated Mobile Technologies., and . ANT/SEIT, volume 109 of Procedia Computer Science, page 1086-1091. Elsevier, (2017)New Waves of Cyber Attacks in the Time of COVID19., and . Honoring Professor Mohammad S. Obaidat, volume 289 of Lecture Notes in Networks and Systems, page 617-630. Springer, (2022)Wildfire Detection using Wireless Mesh Network., , , , , and . FMEC, page 229-234. IEEE, (2019)Automated negotiated user profiling across distributed social mobile clouds for resource optimisation., , , and . Concurr. Comput. Pract. Exp., (2020)A comprehensive deep learning benchmark for IoT IDS., , , and . Comput. Secur., (2022)Authorizations in Cloud-Based Internet of Things: Current Trends and Use Cases., , , and . FMEC, page 241-246. IEEE, (2019)Health Care Insurance Fraud Detection Using Blockchain., , , , , and . SDS, page 145-152. IEEE, (2020)