Author of the publication

Fingerprinting generation for Advanced Persistent Threats (APT) detection using Machine Learning techniques.

, , , and . CITA, page 31-36. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resolving the imbalance issue in short messaging service spam dataset using cost-sensitive techniques., and . J. Inf. Secur. Appl., (2020)A Privacy Preservation Quality of Service (QoS) Model for Data Exposure in Android Smartphone Usage., , and . Sensors, 21 (5): 1667 (2021)Computational Model for Trust Management in RFID Supply Chains., and . MASS, page 734-740. IEEE Computer Society, (2009)Conceptualizing Distrust Model with Balance Theory and Multi-Faceted Model for Mitigating False Reviews in Location-Based Services (LBS)., , and . Symmetry, 11 (9): 1118 (2019)Cyberbullying and a Mobile Game App? An Initial Perspective on an Alternative Solution., , , , and . J. Inf. Process. Syst., 13 (3): 559-572 (2017)Security Challenges and Mitigations of NFC-Enabled Attendance System., , , , , and . ICSI (2), volume 9141 of Lecture Notes in Computer Science, page 160-167. Springer, (2015)Trust Framework for RFID Tracking in Supply Chain Management., and . IWRT, page 17-26. INSTICC PRESS, (2009)Security and privacy protection in RFID-enabled supply chain management., , and . Int. J. Radio Freq. Identif. Technol. Appl., 3 (4): 294-318 (2011)Trust in RFID-enabled Supply-Chain Management., and . Int. J. Secur. Networks, 5 (2/3): 96-105 (2010)RFID-enabled supply chain detection using clustering algorithms., , and . IMCOM, page 8:1-8:8. ACM, (2015)