From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks., , , , , , , , , и 2 other автор(ы). IEEE Access, (2022)State-of-the-art in artificial neural network applications: A survey, , , , , и . Heliyon, 4 (11): e00938 (2018)Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey., , , и . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part B): 10217-10245 (ноября 2022)A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities., , , , , и . Neural Comput. Appl., 33 (22): 15091-15118 (2021)Unveiling the Dark Side of ChatGPT: Exploring Cyberattacks and Enhancing User Awareness., , , , , и . Inf., 15 (1): 27 (2024)A Review on the Security of the Internet of Things: Challenges and Solutions., , , , и . Wirel. Pers. Commun., 119 (3): 2603-2637 (2021)A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems., , , , , и . IEEE Access, (2019)A deeper look into cybersecurity issues in the wake of Covid-19: A survey., , , и . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part A): 8176-8206 (2022)HoneyDetails: A prototype for ensuring patient's information privacy and thwarting electronic health record threats based on decoys., , , , , и . Health Informatics J., 26 (3): 2083-2104 (2020)The internet of things security: A survey encompassing unexplored areas and new insights., , , , , , и . Comput. Secur., (2022)