Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Countering cyber threats for industrial applications: An automated approach for malware evasion detection and analysis., , and . J. Netw. Comput. Appl., (2018)Survey on cybersecurity issues in wireless mesh networks based eHealthcare., , , , , , and . HealthCom, page 1-7. IEEE, (2016)A Survey on Network Layer Attacks and AODV Defense in Mobile Ad Hoc Networks., , and . SERE (Companion), page 185-191. IEEE, (2014)Algebraic Side Channel Attack on Trivium and Grain Ciphers., , , , and . IEEE Access, (2017)A Framework to Estimate the Nutritional Value of Food in Real Time Using Deep Learning Techniques., , , , , , , , and . IEEE Access, (2019)Antenna and Propagation Considerations for Amateur UAV Monitoring., , , , , , , , and . IEEE Access, (2018)Anomaly Detection in Wireless Sensor Networks Using Immune-Based Bioinspired Mechanism., , , and . IJDSN, (2015)Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms., , , and . ISBAST, page 129-132. IEEE, (2014)Hand-based multibiometric systems: state-of-the-art and future challenges., , , , , and . PeerJ Comput. Sci., (2021)Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems., , , and . Neurocomputing, (2017)