Author of the publication

Hidden Link Prediction in Criminal Networks Using the Deep Reinforcement Learning Technique.

, , , and . Computers, 8 (1): 8 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Gamification in Software Traceability: Between Test and Code Artifacts., , and . ICSOFT-EA, page 393-400. SciTePress, (2015)A new grid resource discovery framework., and . Int. Arab J. Inf. Technol., 8 (1): 99-107 (2011)Proposing Encryption Selection Model for IoT Devices Based on IoT Device Design., , , and . ICACT, page 210-219. IEEE, (2022)Comparative Analysis of Intrusion Detection Approaches., , and . UKSim, page 586-591. IEEE Computer Society, (2010)Underwater wireless sensor networks: routing issues and future challenges., and . MoMM, page 370-375. ACM, (2009)An efficient Dynamic Addressing based routing protocol for Underwater Wireless Sensor Networks., , , and . Comput. Commun., 35 (4): 475-486 (2012)Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm., , , and . Comput., 8 (4): 79 (2019)Cyber Security: Vulnerabilities and Solutions for Telemedicine over Cloud Architectures., , and . NDT (1), volume 293 of Communications in Computer and Information Science, page 197-207. Springer, (2012)Reliable data deliveries using packet optimization in multi-hop underwater sensor networks., , , and . J. King Saud Univ. Comput. Inf. Sci., 24 (1): 41-48 (2012)Situation-Aware Deep Reinforcement Learning Link Prediction Model for Evolving Criminal Networks., , , and . IEEE Access, (2020)