Author of the publication

An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm.

, , , , and . Comput. Networks, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid MAC Protocol for UAV-Assisted Data Gathering in a Wireless Sensor Network., , and . Internet Things, (2021)SCADA intrusion detection scheme exploiting the fusion of modified decision tree and Chi-square feature selection., , , and . Internet Things, (April 2023)IoT-based adaptive network mechanism for reliable smart farm system., , , and . Comput. Electron. Agric., (2020)Sparsely Connected CNN for Efficient Automatic Modulation Recognition., , , and . IEEE Trans. Veh. Technol., 69 (12): 15557-15568 (2020)Underwater Acoustic Target Classification Based on Dense Convolutional Neural Network., , and . IEEE Geosci. Remote. Sens. Lett., (2022)A Long Short-Term Memory-Based Solar Irradiance Prediction Scheme Using Meteorological Data., , , and . IEEE Geosci. Remote. Sens. Lett., (2022)Quantitative intrusion intensity assessment for intrusion detection systems., , , and . Secur. Commun. Networks, 5 (10): 1199-1208 (2012)Cooperative transmission scheme for multi-hop underwater acoustic sensor networks., and . Int. J. Commun. Networks Distributed Syst., 14 (1): 1-18 (2015)Efficient-spectrum management based on localisation of primary user position towards 5G., , and . IET Commun., 14 (20): 3567-3577 (2020)Reconstruct unrecoverable data in real-time networks using Bézier curve., , and . IET Commun., 9 (5): 596-602 (2015)