Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient and secure data sharing framework using homomorphic encryption in the cloud., , , and . Cloud-I, page 8. ACM, (2012)DeepICU: imbalanced classification by using deep neural networks for network intrusion detection., , , , and . Int. J. Big Data Intell., 7 (3): 137-147 (2020)Privacy-Preserving and Outsourced Multi-user K-Means Clustering., , , , and . CIC, page 80-89. IEEE Computer Society, (2015)Privacy-Preserving and Outsourced Multi-User k-Means Clustering., , , , and . CoRR, (2014)A secure data sharing and query processing framework via federation of cloud computing., , , and . Inf. Syst., (2015)An efficient and probabilistic secure bit-decomposition., , and . AsiaCCS, page 541-546. ACM, (2013)Review of Ransomware Attacks and a Data Recovery Framework using Autopsy Digital Forensics Platform., , and . CCWC, page 605-611. IEEE, (2023)Privacy-Preserving Protocols for Shortest Path Discovery over Outsourced Encrypted Graph Data., , , and . IRI, page 427-434. IEEE Computer Society, (2015)Investigating Drone Data Recovery Beyond the Obvious Using Digital Forensics., , and . UEMCON, page 254-260. IEEE, (2023)Educational Simulation Design to Transform Learning in Earth and Environmental Sciences., , , , , , and . FIE, page 1-6. IEEE, (2020)