Mukhtar, Naila
53  results:
Search for persons X
?
 
?
 
?
8

Edge enhanced deep learning system for IoT edge device secu..:

Mukhtar, Naila ; Mehrabi, Ali ; Kong, Yinan.
Concurrency and Computation: Practice and Experience.  35 (2021)  13 - p. , 2021
 
?
9

Power Side-Channel Analysis of RNS GLV ECC Using Machine an..:

Mehrabi, Mohamad Ali ; Mukhtar, Naila ; Jolfaei, Alireza
ACM Transactions on Internet Technology (TOIT).  21 (2021)  3 - p. 1-20 , 2021
 
?
 
?
11

On features suitable for power analysis — Filtering the con..:

, In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS),
Mukhtar, Naila ; Kong, Yinan - p. 1-6 , 2018
 
?
13

Improved trust based key management for end-to-end secure c..:

, In: Proceedings of the 8th International Conference on Security of Information and Networks,
Mukhtar, Naila ; Baig, M. S. ; Khan, L. A. - p. 68-75 , 2015
 
1-15