Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media.. (May 2022)A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks., , , and . CoRR, (2020)An innovative technique for web text watermarking (AITW)., , and . Inf. Secur. J. A Glob. Perspect., 25 (4-6): 191-196 (2016)Do Dark Web and Cryptocurrencies Empower Cybercriminals?, , , , and . ICDF2C, volume 441 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 277-293. Springer, (2021)A New Gene Selection Algorithm using Fuzzy-Rough Set Theory for Tumor Classification., and . CoRR, (2020)Information Hiding in Digital Textual Contents: Techniques and Current Challenges., , , and . Computer, 55 (6): 56-65 (2022)Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis., , , , and . Entropy, 21 (4): 355 (2019)Privacy-Preserving Techniques in Cloud/Fog and Internet of Things., , , , and . Cryptogr., 7 (4): 51 (September 2023)Misinformation Detection on Social Media: Challenges and the Road Ahead., , , , , and . IT Prof., 24 (1): 34-40 (2022)Safety Risk Monitoring of Cyber-Physical Power Systems Based on Ensemble Learning Algorithm., , , , , , and . IEEE Access, (2019)