Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling Ransomware Spreading by a Dynamic Node-Level Method.. IEEE Access, (2019)Secure Similarity Search Over Encrypted Non-Uniform Datasets., , , and . IEEE Trans. Cloud Comput., 10 (3): 2102-2117 (2022)Modeling cyber rumor spreading over mobile social networks: A compartment approach., , , , and . Appl. Math. Comput., (2019)Modeling the propagation of mobile malware on complex networks., , , , , and . Commun. Nonlinear Sci. Numer. Simul., (2016)Weak Ordering Space Search in Turn-based War Chess Gaming., , , and . SPAC, page 141-145. IEEE, (2018)Distributed Incremental Cost Consensus-Based Optimization Algorithms for Economic Dispatch in a Microgrid., and . IEEE Access, (2020)A Cost-Effective Algorithm for Selecting Optimal Bandwidth to Clear Malicious Codes., , , and . IEEE Access, (2020)Stability of neural networks with delay and variable-time impulses., , , , , and . Neurocomputing, (2016)CLETer: A Character-level Evasion Technique Against Deep Learning DGA Classifiers., , , and . EAI Endorsed Trans. Security Safety, 7 (24): e5 (2021)Propagation of computer virus both across the Internet and external computers: A complex-network approach., , , , , and . Commun. Nonlinear Sci. Numer. Simul., 19 (8): 2785-2792 (2014)