Publications

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All

Securing the Road Ahead: A Survey on Internet of Vehicles Security Powered by a Conceptual Blockchain-Based Intrusion Detection System for Smart Cities

Transactions on Emerging Telecommunications Technologies | Vol. 36 | Issue 4 | 2025

DOI: https://doi.org/10.1002/ett.70133

Security and privacy in multi-cloud and hybrid cloud environments: Challenges, strategies, and future directions

Computers & Security | Vol. 157 | Issue 1 | 2025

DOI: https://doi.org/10.1016/j.cose.2025.104599

Security and privacy in multi-cloud and hybrid cloud environments: Challenges, strategies, and future directions

Computers & Security | Vol. 157 | Issue 2025 | 2025

DOI: https://doi.org/10.1016/j.cose.2025.104599

SENTINEY: Securing ENcrypted mulTI-party computatIoN for Enhanced data privacY and phishing detection

Expert Systems with Applications | Vol. 256 | 2024

DOI: https://doi.org/10.1016/j.eswa.2024.124896

Sketch–to–3D: Transforming Hand-Sketched Floorplans into 3D Layouts

2024 International Conference on Digital Image Computing: Techniques and Applications (DICTA) | 2024

DOI: https://doi.org/10.1109/DICTA63115.2024.00060

Selective Multi-View Deep Model for 3D Object Classification

2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) | 2024

DOI: https://doi.org/10.1109/CVPRW63382.2024.00077

Selection of a smart and secure education school system based on the Internet of Things using Entropy and TOPSIS approaches

Computers in Human Behavior | Vol. 159 | 2024

DOI: https://doi.org/10.1016/j.chb.2024.108346

Synergizing AI, IoT, and Blockchain for Diagnosing Pandemic Diseases in Smart Cities: Challenges and Opportunities

Sustainable Machine Intelligence Journal | Vol. 7 | 2024

DOI: https://doi.org/10.61356/SMIJ.2024.77106

SFMR-SH: Secure Framework for Mitigating Ransomware Attacks in Smart Healthcare Using Blockchain Technology

Sustainable Machine Intelligence Journal | 2023

DOI: https://doi.org/10.61185/SMIJ.2023.22104

Seamless transformation from use case to sequence diagrams

PeerJ Computer Science | Vol. 9 | Issue 1999 | 2023

DOI: https://doi.org/10.7717/peerj-cs.1444

Strengthening cloud security: an innovative multi-factor multi-layer authentication framework for cloud user authentication

Applied Sciences | 2023

DOI: https://doi.org/10.3390/app131910871

Smartphone User Identification/Authentication Using Accelerometer and Gyroscope Data

Sustainability | Vol. 15 | Issue 13 | 2023

DOI: https://doi.org/10.3390/su151310456

Securing Low-Power Blockchain-Enabled IoT Devices Against Energy Depletion Attack

ACM Transactions on Internet Technology (TOIT) | 2023

DOI: https://doi.org/10.1145/3511903

Supporting Spatial Thinking in Augmented Reality Narrative: A Field Study

International Conference on Interactive Digital Storytelling | 2022

DOI: https://doi.org/10.1007/978-3-031-22298-6_17

SVM‐based generative adverserial networks for federated learning and edge computing attack model and outpoising

Expert Systems | 2022

DOI: https://doi.org/10.1111/exsy.13072

Securing Low-Power Blockchain-Enabled IoT Devices Against Energy Depletion Attack

ACM Transactions on Internet Technology | 2022

DOI: https://doi.org/10.1145/3511903

Signal-to-Noise Ratio Comparison of Several Filters against Phantom Image

Journal of Healthcare Engineering | 2022

DOI: https://doi.org/10.1155/2022/4724342

Secure Authentication Scheme Using Diffie-Hellman Key Agreement for Smart IoT Irrigation Systems

Electronics | 2022

DOI: https://doi.org/10.3390/electronics11020188

Secure Data Exchange and Data Leakage Detection in an Untrusted Cloud

Communications in Computer and Information Science | Vol. 899 | 2018

DOI: https://doi.org/10.1007/978-981-13-2035-4_10

Secure Data Communication in Autonomous V2X Systems

2018 IEEE International Congress on Internet of Things (ICIOT) | 2018

DOI: https://doi.org/10.1109/ICIOT.2018.00029