Author of the publication

A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems.

, , , , and . Clust. Comput., 25 (1): 561-578 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Game-Based Adaptive Remote Access VPN for IoT: Application to e-Health., , , and . GLOBECOM, page 1-7. IEEE, (2018)Characterizing Multi-Hop Communication in Vehicular Networks., and . WCNC, page 3309-3313. IEEE, (2008)An accurate and efficient collaborative intrusion detection framework to secure vehicular networks., and . Comput. Electr. Eng., (2015)Deep Learning-Based Real-Time Object Detection in Inland Navigation., , , , and . GLOBECOM, page 1-6. IEEE, (2019)Game model to optimally combine electric vehicles with green and non-green sources into an end-to-end smart grid architecture., , , and . J. Netw. Comput. Appl., (2016)Extensive Experimental Characterization of Communications in Vehicular Ad Hoc Networks within Different Environments., , and . VTC Spring, page 2590-2594. IEEE, (2007)Background subtraction for aerial surveillance conditions., , and . I4CS, page 28-33. IEEE, (2014)UAVs for traffic monitoring: A sequential game-based computation offloading/sharing approach., , , , and . Comput. Networks, (2020)A2Ba: Adaptive Background Modelling for Visual Aerial Surveillance Conditions., , and . EAI Endorsed Trans. Ind. Networks Intell. Syst., 2 (4): e3 (2015)Call admission control in cellular networks: a reinforcement learning solution., , and . Int. J. Netw. Manag., 14 (2): 89-103 (2004)