Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TD-PSO: Task distribution approach based on particle swarm optimization for vehicular ad hoc network., , , and . Trans. Emerg. Telecommun. Technol., (2022)Selective Mobile Cloud Offloading to Augment Multi-Persona Performance and Viability., , , and . IEEE Trans. Cloud Computing, 7 (2): 314-328 (2019)ModularFed: Leveraging Modularity in Federated Learning Frameworks., , , , , and . CoRR, (2022)Combining heterogeneous anomaly detectors for improved software security., , , and . J. Syst. Softw., (2018)An anomaly detection system based on variable N-gram features and one-class SVM., , , and . Inf. Softw. Technol., (2017)ITADP: An inter-tenant attack detection and prevention framework for multi-tenant SaaS., , and . J. Inf. Secur. Appl., (2019)Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process., , , and . Secur. Commun. Networks, 9 (16): 3483-3495 (2016)Multi-Tenant Intrusion Detection Framework as a Service for SaaS., , , and . IEEE Trans. Serv. Comput., 15 (5): 2925-2938 (2022)Independent and Identically Distributed (IID) Data Assessment in Federated Learning., , , , , and . GLOBECOM, page 293-298. IEEE, (2022)P-Code Based Classification to Detect Malicious VBA Macro., and . ISNCC, page 1-6. IEEE, (2020)