Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine Learning Aided Blockchain Assisted Framework for Wireless Networks., , , , , and . IEEE Netw., 34 (5): 262-268 (2020)Analysis of P2P, IRC and HTTP traffic for botnets detection., , , and . Peer-to-Peer Netw. Appl., 11 (5): 848-861 (2018)Network anomaly detection using a cross-correlation-based long-range dependence analysis., , , , and . Int. J. Netw. Manag., (2020)Joint beamforming and admission control for cache-enabled Cloud-RAN with limited fronthaul capacity., , , , and . IET Signal Process., 14 (5): 278-287 (2020)Trusted UAV Network Coverage Using Blockchain, Machine Learning, and Auction Mechanisms., , , , , and . IEEE Access, (2020)A robust anomaly detection method using a constant false alarm rate approach., , , , , , , and . Multim. Tools Appl., 79 (17-18): 12727-12750 (2020)Network traffic behavior analysis by decomposition into control and data planes., , , and . IPDPS, page 1-8. IEEE, (2008)Periodic Behavior in Botnet Command and Control Channels Traffic., , and . GLOBECOM, page 1-6. IEEE, (2009)Comparative evaluation of different classifiers for robust distorted-character recognition., , , and . DRR, volume 6067 of SPIE Proceedings, page 60670O. SPIE, (2006)Bayesian Optimization-Driven Adversarial Poisoning Attacks Against Distributed Learning., , , and . IEEE Access, (2023)