Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine Learning based Anomaly Detection for 5G Networks., and . CoRR, (2020)LTE/Wi-Fi Coordination in Unlicensed Bands: An SD-RAN Approach., , , , and . NetSoft, page 311-315. IEEE, (2019)An empirical study on vulnerability assessment and penetration detection for highly sensitive networks., , , , , and . J. Intell. Syst., 30 (1): 592-603 (2021)6G White Paper on Machine Learning in Wireless Communication Networks., , , , , , , , , and 17 other author(s). CoRR, (2020)6G White paper: Research challenges for Trust, Security and Privacy., , , , , , , , , and 17 other author(s). CoRR, (2020)SDN Enabled DDoS Attack Detection and Mitigation for 5G Networks., , and . J. Commun., 16 (7): 267-275 (2021)5G Coverage, Prediction, and Trial Measurements., and . CoRR, (2020)An Overview of Attacks and Defences on Intelligent Connected Vehicles., , , , , , , , , and 2 other author(s). CoRR, (2019)IoT Security: Botnet detection in IoT using Machine learning., , and . CoRR, (2021)Effective Intrusion Detection System Using XGBoost., , and . Information, 9 (7): 149 (2018)