Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Developing a Κ-ary malware using blockchain., , and . NOMS, page 1-4. IEEE, (2018)Arabic Cyberbullying Detection: Enhancing Performance by Using Ensemble Machine Learning., , and . iThings/GreenCom/CPSCom/SmartData, page 323-327. IEEE, (2019)On distributed ledgers security and illegal uses., , and . Future Gener. Comput. Syst., (2020)Comparative study of recent MEA malware phylogeny., , and . ICCCS, page 16-20. IEEE, (2017)Comparative analysis of blockchain technologies and TOR network: Two faces of the same reality?, , and . CSNet, page 1-9. IEEE, (2017)A data flow-oriented specification method for analysing network security configurations., , , , and . Int. J. Internet Protoc. Technol., 8 (2/3): 58-76 (2014)Cloud based private data analytic using secure computation over encrypted data., , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (8 Part A): 4931-4942 (2022)A specification method for analyzing fine grained network security mechanism configurations., , , , and . CNS, page 483-487. IEEE, (2013)Blockchain-based multi-organizational cyber risk management framework for collaborative environments., , , , and . Int. J. Inf. Sec., 23 (2): 1231-1249 (April 2024)Developing a K-ary malware using Blockchain., , and . CoRR, (2018)