Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of OpenStack Cloud Platform Identity Management Scheme., , , and . CITS, page 1-5. IEEE, (2018)Deep Learning-Based Multi-Classification for Malware Detection in IoT., , , and . J. Circuits Syst. Comput., 31 (17): 2250297:1-2250297:24 (2022)Integrating Electrical Analogy and Computer Modeling of Groundwater Flow for Teaching Flownet Concepts., , and . Int. J. Eng. Pedagog., 3 (4): 39-46 (2013)APT Attack Detection Scheme Based on CK Sketch and DNS Traffic., , , and . Sensors, 23 (4): 2217 (February 2023)Medical Devices are at Risk: Information Security on Diagnostic Imaging System., , , and . ACM Conference on Computer and Communications Security, page 2309-2311. ACM, (2018)An Analysis of a New Detection Method for Spear Phishing Attack., , , and . CSPS (3), volume 517 of Lecture Notes in Electrical Engineering, page 1063-1072. Springer, (2018)Honeynet Construction Based on Intrusion Detection., , , , , , and . CSAE, page 80:1-80:5. ACM, (2019)Android Malware Detection Based on Convolutional Neural Networks., , , , , and . CSAE, page 151:1-151:6. ACM, (2019)Anomalous Network Traffic Detection Based on CK Sketch and Machine Learning., , , , and . CSS, volume 13547 of Lecture Notes in Computer Science, page 225-243. Springer, (2022)An Feasible Key Management Scheme in Ad Hoc Network., , , and . SNPD (1), page 300-303. IEEE Computer Society, (2007)