Mohammed Kaosar

Orcid: 0000-0003-1101-3264

According to our database1, Mohammed Kaosar authored at least 15 papers between 2013 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Social media bot detection with deep learning methods: a systematic review.
Neural Comput. Appl., April, 2023

Effectiveness of Federated Learning and CNN Ensemble Architectures for Identifying Brain Tumors Using MRI Images.
Neural Process. Lett., 2023

2021
A Lossless Compression Technique for Huffman-based Differential Encoding in IoT for Smart Agriculture.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2021

D2Gen: A Decentralized Device Genome Based Integrity Verification Mechanism for Collaborative Intrusion Detection Systems.
IEEE Access, 2021

Internet Traffic Classification Using an Ensemble of Deep Convolutional Neural Networks.
Proceedings of the FlexNets '21: Proceedings of the 4th FlexNets Workshop on Flexible Networks Artificial Intelligence Supported Network Flexibility and Agility, 2021

Blockchain-based Secure CIDS Operation.
Proceedings of the 5th Cyber Security in Networking Conference, 2021

2018
Design and Implementation of a Wearable Gas Sensor Network for Oil and Gas Industry Workers.
J. Comput., 2018

2016
Privacy preserving cloud computation using Domingo-Ferrer scheme.
J. King Saud Univ. Comput. Inf. Sci., 2016

2015
Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks.
Int. J. Wirel. Networks Broadband Technol., 2015

2014
Anomaly Detection in Wireless Sensor Network.
J. Networks, 2014

A Secure Real Time Data Processing Framework for Personally Controlled Electronic Health Record (PCEHR) System.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

What is the first step in designing an application protocol for wireless sensor networks (WSNs)?
Proceedings of the IEEE Sensors Applications Symposium, 2014

2013
Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs.
Proceedings of the Security and Privacy in Communication Networks, 2013

(k - n) Oblivious Transfer Using Fully Homomorphic Encryption System.
Proceedings of the Security and Privacy in Communication Networks, 2013

Establishing secured communications in cluster based wireless sensor networks.
Proceedings of the International Symposium on Wireless and pervasive Computing, 2013


  Loading...