Author of the publication

A Novel Logo Identification Technique for Logo-Based Phishing Detection in Cyber-Physical Systems.

, , and . Future Internet, 14 (8): 241 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Experimental Comparison and Impact Analysis of Various RPL-Based IoT Security Threats Using Contiki Simulator., , , and . COMSNETS, page 111-116. IEEE, (2024)A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors., , , , , , and . ICETE (1), page 255-264. SciTePress, (2018)Graph-Based Symmetric Crypto-System for Data Confidentiality., , , , and . GLOBECOM, page 1-6. IEEE, (2018)Analytical Model for Sybil Attack Phases in Internet of Things., , , and . IEEE Internet of Things Journal, 6 (1): 379-387 (2019)Hybrid Mode of Operation Schemes for P2P Communication to Analyze End-Point Individual Behaviour in IoT., , , , , and . ACM Trans. Sens. Networks, 19 (2): 31:1-31:23 (May 2023)Node coloring based replica detection technique in wireless sensor networks., and . Wireless Networks, 20 (8): 2419-2435 (2014)Performance-based Comparative Analysis of Open Source Vulnerability Testing Tools for Web Database Applications., and . ICCCNT, page 1-5. IEEE, (2020)Hybrid Mode of Operations for RPL in IoT: A Systematic Survey., , , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 3574-3586 (2022)Comparison of Nikto and Uniscan for measuring URL vulnerability., , and . ICCCNT, page 1-6. IEEE, (2019)A Novel Logo Identification Technique for Logo-Based Phishing Detection in Cyber-Physical Systems., , and . Future Internet, 14 (8): 241 (2022)