Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel approach for mobile malware classification and detection in Android systems., , , , , and . Multim. Tools Appl., 78 (3): 3529-3552 (2019)A dynamic key management and secure data transfer based on m-tree structure with multi-level security framework for Internet of vehicles., and . Connect. Sci., 34 (1): 1089-1118 (2022)A Mobile Application Framework for Rapid Integration of Ubiquitous Web Services., , , , and . UIC/ATC, page 136-142. IEEE Computer Society, (2012)Reliable Transmission of Multimedia Streaming In Cluster-Based Ad Hoc Networks., , and . JCIS, Atlantis Press, (2006)A Mobile e-Commerce Solution., , , and . ISMSE, page 215-224. IEEE Computer Society, (2000)Toward a Mobile Application for Social Sharing Context., , , and . MUSIC, volume 274 of Lecture Notes in Electrical Engineering, page 93-98. Springer, (2013)Recommendation service for hotel applications on blockchain., , , and . Int. J. Comput. Sci. Eng., 25 (6): 629-642 (2022)Researches on secure data transmission mechanisms in cloud Internet of Things architectures., , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1-4. IEEE, (2017)A Secure On-Demand Routing with Distributed Authentication for Trust-Based Ad Hoc Networks., and . NPC, volume 3779 of Lecture Notes in Computer Science, page 343-350. Springer, (2005)Sentiment classification of Chinese Weibo based on extended sentiment dictionary and organisational structure of comments., , , , and . Connect. Sci., 34 (1): 409-428 (2022)