Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Path Integral for Non-Paraxial Optics, , , , , , and . ArXiv e-prints, (March 2018)Effects of Aromatherapy and Music on Napping-Time Quality in Young Adults: EEG Sleep Study., , , , , and . IC3INA, page 261-266. ACM, (2022)Dimension of mobile security model: mobile user security threats and awareness., , and . IJMLO, 9 (1): 66-85 (2015)Threshold Verification Technique for Network Intrusion Detection System, , , , , and . CoRR, (2009)Advanced Trace Pattern For Computer Intrusion Discovery, , , , , and . CoRR, (2010)New Multi-step Worm Attack Model, , , , , and . CoRR, (2010)Revealing Influenced Selected Feature for P2P Botnet Detection., , , and . Int. J. Commun. Networks Inf. Secur., (2017)Diagnosis of Schizophrenia Patients in EEG Signals Using Multiple Optimizer-Convolutional Neural Network (CNN)., , and . IC3INA, page 166-170. IEEE, (2023)Deception detection of EEG-P300 component classified by SVM method., , , , , and . ICSCA, page 299-303. ACM, (2017)Revealing the Feature Influence in HTTP Botnet Detection., , , , and . Int. J. Commun. Networks Inf. Secur., (2017)