Author of the publication

Examining the Performance of Fog-Aided, Cloud-Centered IoT in a Real-World Environment.

, , , and . Sensors, 21 (21): 6950 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social-Guard: Detecting Scammers in Online Dating., , , , , and . EIT, page 416-422. IEEE, (2020)Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks., , , , and . Clust. Comput., 27 (4): 4551-4568 (July 2024)Trusted Security Model for IDS Using Deep Learning., , and . ICSPIS, page 1-4. IEEE, (2020)Evaluating Security and Privacy in Cloud Services., , , and . COMPSAC, page 683-686. IEEE Computer Society, (2016)CSSR: Cloud Services Security Recommender., , and . SERVICES, page 48-55. IEEE Computer Society, (2016)Examining the Performance of Fog-Aided, Cloud-Centered IoT in a Real-World Environment., , , and . Sensors, 21 (21): 6950 (2021)Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment., , and . LCN Workshops, page 112-120. IEEE Computer Society, (2017)Fine-Grained Access Control in the Era of Cloud Computing: An Analytical Review., , , and . CCWC, page 748-755. IEEE, (2020)Acknowledgment to Reviewers of Future Internet in 2020, , , , , , , , , and 1 other author(s). (2021)Evaluating security and privacy in cloud computing services: A Stakeholder's perspective., , and . ICITST, page 388-395. IEEE, (2012)