Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks., , , and . IEEE Access, (2021)Eth-PSD: A Machine Learning-Based Phishing Scam Detection Approach in Ethereum., , , and . IEEE Access, (2022)Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey., , , , and . IEEE Access, (2021)ES-SECS/GEM: An Efficient Security Mechanism for SECS/GEM Communications., , , , and . IEEE Access, (2023)Enhancement of NTSA Secure Communication with One-Time Pad (OTP) in IoT., , and . Informatica (Slovenia), (2023)DDoS attack aware environment with secure clustering and routing based on RPL protocol operation., , , and . IET Circuits Devices Syst., 13 (6): 748-755 (2019)Comparative Analysis of State-of-the-Art EDoS Mitigation Techniques in Cloud Computing Environment., , and . CoRR, (2019)Feature Selection for Detecting ICMPv6-Based DDoS Attacks Using Binary Flower Pollination Algorithm., , , , , , , , and . Comput. Syst. Sci. Eng., 47 (1): 553-574 (2023)A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking., , , , , and . Sensors, 23 (9): 4441 (2023)Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing., , , , , , , , and . Sensors, 23 (7): 3543 (April 2023)