Online Repositories
Detailed Publications
2025
Catch Me If You Can: Rogue AI Detection and Correction at Scale
Electronics, 14(20)
Blockchain-Enabled GDPR Compliance Enforcement for IIoT Data Access
Journal of Cybersecurity and Privacy, 5(4)
π Journal
π₯ Q1
Securing Cloud and IoT Identity: An Analysis of Keystone Authentication Mechanisms in Openstack
2025 8th Conference on Cloud and Internet of Things (CIoT)
π Conference
π DOI
Securing the Future: Lightweight Blockchain Solutions for IIoT and IoT Networks
Security and Privacy, 8(4)
π Journal
π₯ Q1
The Effect Of Consumer's Intention And Feedback For The Use Of Mobile NFC Payment Technology
Economic Studies, 34(6)
π Journal
π₯ Q3
VITA: Verifieble Decentralized Authentication and Access Control in B5G/6G IoT Environments
2025 33rd International Conference on Software, Telecommunications, and Computer Networks (SoftCOM 2025)
π Conference
π
B
On Homomorphic Encryption Feasibility in Large-Scale Cloud Environment
31st Workshop on Information and Communications Technologies Proceedings
π Conference
Byzantine-Resilient Federated Learning: Evaluating MPC Approaches
2025 25th International Conference on Distributed Computing Systems Workshops (ICDCSW)
π Conference
π A
2024
Congestion Control Prediction Model for 5G Environment Based on Supervised and Unsupervised Machine Learning Approach
IEEE Access, 12, 91127-91139
π Journal
π₯ Q1
Blockchain-based privacy-preserving shop floor auditing architecture
IEEE Access, 12, 26747-26758
π Journal
π₯ Q1
Fedlabx: a practical and privacy-preserving framework for federated learning
Complex & Intelligent Systems, 10(1), 677-690
π Journal
π₯ Q1
Regulatory Compliance Verification: A Privacy Preserving Approach
2024 8th Cyber Security in Networking Conference (CSNet)
π Conference
Enhancing IoT Security in 6G Networks: AI-Based Intrusion Detection, Penetration Testing, and Blockchain-Based Trust Management (Work-in-Progress Paper)
IFIP International Internet of Things Conference, 53-67
π Conference
Footprint-Optimized Orchestration and Management of Secure Complex Services over 6G Continuum
2024 IEEE Conference on Standards for Communications and Networking (CSCN), 383-388
π Conference
2023
Authentication and data access challenges in safeguarding industrial IoT
Lecture Notes in Electrical Engineering, vol. 1194
π Book Chapter
3L-AODV: Three layer security protocol for grayhole attack mitigation in MANET
Lecture Notes on Networks and Systems, 813-823
π Book Chapter
π₯ Q3
Privacy-preserving blockchain technologies
Sensors, 23(16), 7172
π Journal
π₯ Q1
A comparative study of supervised/unsupervised machine learning algorithms with feature selection approaches to predict student performance
International Journal of Data Mining, Modelling and Management, 15(4), 393-409
π Journal
π₯ Q2
Distributed Cryptography for Lightweight Encryption in Decentralized CP-ABE
2023 19th International Conference on Wireless and Mobile Computing
π Conference
π
B
2022
D3VN: Decentralized abe-based distributed data validation network
Lecture Notes on Networks and Systems
π Book Chapter
π₯ Q3
ODABE: Outsourced Decentralized CP-ABE in Internet of Things
Lecture Notes in Computer Science, vol. 13285, 611-615
π Book Chapter
π₯ Q3
On Security and Performance Requirements of Decentralized Resource Discovery in IoT
Lecture Notes in Electrical Engineering, 289-302
π Book Chapter
Security Analysis and Deployment Measurement of Transport Layer Security Protocol
Lecture Notes in Electrical Engineering, 725-739
π Book Chapter
A prediction model based machine learning algorithms with feature selection approaches over imbalanced dataset
Indonesian Journal of Electrical Engineering and Computer Science, 28(2)
π Journal
OLAP Mining with Educational Data Mart to Predict Students Performance
Informatica, 46(5)
π Journal
π₯ Q2
Distributed Address Table (DAT): A decentralized model for end-to-end communication in IoT
Peer-to-Peer Networking and Applications, 15(1), 178-193
π Journal
π₯ Q1
Cognitive Radio for Smart Grid: A Decentralized Emergency Management Approach
2022 32nd International Telecommunication Networks and Applications Conference
π Conference
π
B
Attribute verifier for internet of things
2022 32nd International Telecommunication Networks and Applications Conference
π Conference
π
B
Security verification of key exchange in ciphertext-policy attribute based encryption
2022 7th International Conference on Signal and Image Processing (ICSIP)
π Conference
β Award Winner
SDABE: Efficient encryption in decentralized cp-abe using secret sharing
2022 International Conference on Electrical, Computer and Energy Technologies
π Conference
2021
ATTRED: Attribute based resource discovery for IoT
Sensors, 21(14), 4721
π Journal
π₯ Q1
Supervised learning algorithms in educational data mining: A systematic review
Southeast Europe Journal of Soft Computing, 10(1), 55-70
π Journal
π₯ Q3
LADA: locality aware distributed addressing for edge/fog computing infrastructures
2021 International Conference on Electrical, Computer and Energy Technologies (ICECET), 1-6
π Conference
Formal verification of confidentiality in attribute-based encryption through proverif
21th Central European Conference on Cryptology, 34
π Conference
2020
A decentralized resource discovery using attribute based encryption for internet of things
2020 4th Cyber Security in Networking Conference (CSNet), 1-3
π Conference
Distributed data validation network in IoT: a decentralized validator selection model
Proceedings of the 10th International Conference on the Internet of Things, 1-8
π Conference
Attribute-based encryption in cloud computing environment
2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE), 63-68
π Conference
β Award Winner
Region-based distributed hash table for fog computing infrastructure
13th Joint Conference on Mathematics and Computer Science (MaCS 2020)
π Conference
2019
A decentralized and scalable model for resource discovery in IoT network
2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 1-4
π Conference
π
B
2018
Improved approach of address propagation for f2f networks
2018 2nd European Conference on Electrical Engineering and Computer Science (EECS), 604-609
π Conference
2017
STAODV: a secure and trust based approach to mitigate blackhole attack on AODV based MANET
2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), 1278-1282
π Conference
Weight Analysis For Weighted Cluster Algorithms In Mobile Ad-Hoc Network
Journal of Theoretical & Applied Information Technology, 95(15)
π Journal
π₯ Q3
2016
Secure Model for SMS Exchange over GSM
International Journal of Computer Network & Information Security, 8(1)
π Journal
2013
Simple Model for Coding Geographic Location Coordinates
International Journal of Scientific & Engineering Research, 4(7), 2468-2470
π Journal
Remote patient tracking and monitoring system
International Journal of Computer Science and Mobile Computing, 2(12), 88-94
π Journal