Author of the publication

MagicNET: mobile agents data protection system.

, , , and . Trans. Emerg. Telecommun. Technol., 26 (5): 813-835 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning., , , , and . CoRR, (2024)Privacy Preserving Release of Mobile Sensor Data., , , , , and . CoRR, (2022)Analysing Security and Privacy Threats in the Lockdown Periods of COVID-19 Pandemic: Twitter Dataset Case Study., , , and . CoRR, (2022)CRESCENT+: a self-protecting framework for reliable composite web service delivery., , , and . Iran J. Comput. Sci., 1 (2): 65-87 (2018)Assessment Criteria for Trust Models in Cloud Computing., , , , and . GreenCom/iThings/CPScom, page 254-261. IEEE, (2013)Towards Automatic Annotation and Detection of Fake News., , , , , and . LCN, page 1-9. IEEE, (2023)Don't Be a Victim During a Pandemic! Analysing Security and Privacy Threats in Twitter During COVID-19., , , and . IEEE Access, (2023)Tracking and Personalization., , and . Modern Socio-Technical Perspectives on Privacy, (2022)Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading., , , , , and . ACM Trans. Priv. Secur., 23 (2): 8:1-8:27 (2020)A Review of Computer Vision Methods in Network Security., , and . IEEE Commun. Surv. Tutorials, 23 (3): 1838-1878 (2021)