Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cross-Stack Approach Towards Defending Against Cryptojacking., , , and . IEEE Comput. Archit. Lett., 19 (2): 126-129 (2020)Real-Time Healthcare Monitoring System using Smartphones., and . AICCSA, page 1-6. IEEE Computer Society, (2018)Iterative Clustering for Energy-Efficient Large-Scale Tracking Systems., , and . Wireless Personal Communications, 110 (2): 713-733 (2020)Optimum Bi-level Hierarchical Clustering for Wireless Mobile Tracking Systems., , and . CoRR, (2019)Detecting CAN Bus Intrusion by Applying Machine Learning Method to Graph Based Features., , , and . IntelliSys (3), volume 296 of Lecture Notes in Networks and Systems, page 730-748. Springer, (2021)Internet of things for healthcare monitoring applications based on RFID clustering scheme., , , and . Wirel. Networks, 27 (1): 747-763 (2021)Vehicle Security: A Survey of Security Issues and Vulnerabilities, Malware Attacks and Defenses., , , , , and . IEEE Access, (2021)Dark Firmware: A Systematic Approach to Exploring Application Security Risks in the Presence of Untrusted Firmware., , , , and . RAID, page 413-426. USENIX Association, (2020)Iterative Clustering for Energy-Efficient Large-Scale Tracking Systems., , and . CoRR, (2019)Intelligent token-based code clone detection system for large scale source code., , and . RACS, page 256-260. ACM, (2019)