Author of the publication

Investigation of Computational Intelligence Techniques for Intrusion Detection in Wireless Sensor Networks

, and . International Journal of Computer Networks & Communications (IJCNC), 9 (4): 45-56 (July 2017)
DOI: 10.5121/ijcnc.2017.9404

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolving ANN-based sensors for a context-aware cyber physical system of an offshore gas turbine., , and . Evol. Syst., 9 (2): 119-133 (2018)Evolutionary Computation for Optimal Component Deployment with Multitenancy Isolation in Cloud-hosted Applications., , and . INISTA, page 1-7. IEEE, (2018)Adaptive fault detection tool for real-time integrity monitoring of Subsea Control Systems., and . INISTA, page 21-26. IEEE, (2014)Botnet Detection in the Internet of Things using Deep Learning Approaches., , and . IJCNN, page 1-8. IEEE, (2018)Ensemble Common Features Technique for Lightweight Intrusion Detection in Industrial Control System., and . ICPS, page 1-6. IEEE, (2023)Evaluating Degrees of Multitenancy Isolation: A Case Study of Cloud-Hosted GSD Tools., , and . ICCAC, page 101-112. IEEE Computer Society, (2015)FedREVAN: Real-time DEtection of Vulnerable Android Source Code Through Federated Neural Network with XAI., , , , and . ESORICS Workshops (2), volume 14399 of Lecture Notes in Computer Science, page 426-441. Springer, (2023)Degrees of tenant isolation for cloud-hosted software services: a cross-case analysis., , and . J. Cloud Comput., (2018)Optimal deployment of components of cloud-hosted application for guaranteeing multitenancy isolation., , and . J. Cloud Comput., (2019)Smart problem solving environment for medical decision support., and . GECCO Workshops, page 152-158. ACM, (2005)