Publications

Book:

“Design & Implementation of Private SMS Using GPRS”, https://www.amazon.com/Design-Implementation-Private-Using-GPRS/dp/3659926043

Papers:

  1. "Mineral Exploration Using Neural Networks" , IJCT , http://cirworld.com/index.php/ijct/article/view/707
  2. "Multi-Level Windows Exploitation Using Linux Operating System" , AJSC , http://www.ajsc.leena-luna.co.jp/AJSCPDFs/Vol.5(2)/AJSC2016(5.2-06).pdf
  3. "Design & Implement a Private Chatting Over Bluetooth for Wide Area" , KUISS http://www.kujss.com/en/index.php/archives/56-kujss-2016-vol-11-no-1/433-design-and-implement-privet-chatting-over-bluetooth-for-wide-area
  4. "Cell Phones Are More Dangerous Than Smoking" , AJSC , http://www.ajsc.leena-luna.co.jp/AJSCPDFs/Vol.5(2)/AJSC2016(5.2-07).pdf
  5. "Exploiting DNS Server Vulnerabilities Using Linux O.S." , IJCT , http://cirworld.com/index.php/ijct/article/view/636/622
  6. "Protect Sensitive Knowledge in Data Mining Clustering Algorithm" , http://jatit.org/volumes/ninetyfive15.php