Author of the publication

A blockchain security module for brain-computer interface (BCI) with Multimedia Life Cycle Framework (MLCF)

, , , , , and . Neuroscience Informatics, 2 (1): 100030 (March 2022)
DOI: 10.1016/j.neuri.2021.100030

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Some Issues Regarding Content-Based Image Retrieval (CBIR) for Remote Healthcare Theradiagnosis, , , , , , , and . page 110–134. CRC Press, (July 2023)A comparative analysis of classification techniques for human activity recognition using wearable sensors and smart-phones., , , , , , , and . EAI Endorsed Trans. Pervasive Health Technol., 8 (30): e1 (2022)Management of electronic ledger: a constraint programming approach for solving curricula scheduling problems., and . Int. J. Electron. Secur. Digit. Forensics, 15 (1): 88-99 (2023)Botnet attack detection in Internet of Things devices over cloud environment via machine learning., , , , , , , , and . Concurr. Comput. Pract. Exp., (2022)IMG-forensics: Multimedia-enabled information hiding investigation using convolutional neural network., , , , , , and . IET Image Process., 16 (11): 2854-2862 (2022)IPM-Model: AI and metaheuristic-enabled face recognition using image partial matching for multimedia forensics investigation with genetic algorithm., , , , and . Multim. Tools Appl., 81 (17): 23533-23549 (2022)DeepLeukNet - A CNN based microscopy adaptation model for acute lymphoblastic leukemia classification., , , , , and . Multim. Tools Appl., 83 (7): 21019-21043 (2024)A blockchain security module for brain-computer interface (BCI) with Multimedia Life Cycle Framework (MLCF), , , , , and . Neuroscience Informatics, 2 (1): 100030 (March 2022)MF-Ledger: Blockchain Hyperledger Sawtooth-Enabled Novel and Secure Multimedia Chain of Custody Forensic Investigation Architecture., , , , and . IEEE Access, (2021)Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction., , , , , and . Int. J. Electron. Secur. Digit. Forensics, 14 (2): 124-150 (2022)