Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software-defined networks for resource allocation in cloud computing: A survey., , , , , , and . Comput. Networks, (2021)Improved Feature Selection and Stream Traffic Classification Based on Machine Learning in Software-Defined Networks., , , , , , , and . IEEE Access, (2024)Integration of Hybrid Networks, AI, Ultra Massive-MIMO, THz Frequency, and FBMC Modulation Toward 6G Requirements: A Review., , , , , , , , and . IEEE Access, (2024)DPLBAnt: Improved load balancing technique based on detection and rerouting of elephant flows in software-defined networks., , , , , , , and . Comput. Commun., (2021)A Stacked Ensemble Classifier for an Intrusion Detection System in the Edge of IoT and IIoT Networks., , , , , , and . LATINCOM, page 1-6. IEEE, (2022)Ensuring reliable network operations and maintenance: The role of PMRF for switch maintenance and upgrades in SDN., , , , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (10): 101809 (December 2023)3D-DNaPE: Dynamic Neighbor-Aware Performance Enhancement for Thermally Constrained 3D Many-Core Systems., , , , , and . IEEE Access, (2023)Detection of Management-Frames-Based Denial-of-Service Attack in Wireless LAN Network Using Artificial Neural Network., , , , , , and . Sensors, 23 (5): 2663 (March 2023)Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey., , , , , , , , and . Sensors, 22 (4): 1494 (2022)A Two-Tier Anomaly-based Intrusion Detection Approach for IoT-Enabled Smart Cities., , , , , , , and . INFOCOM Workshops, page 1-7. IEEE, (2023)