Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new light-based solution to the Hamiltonian path problem., , and . Future Gener. Comput. Syst., 29 (2): 520-527 (2013)PSSP with dynamic weighted kernel fusion based on SVM-PHGS., and . Knowl. Based Syst., (2012)Routing anomaly detection in OLSR-based MANETs., , and . Int. J. Mob. Commun., 13 (3): 276-298 (2015)Fusion of one-class classifiers for protocol-based anomaly detection in AODV-based mobile ad hoc networks., , and . Int. J. Ad Hoc Ubiquitous Comput., 14 (3): 158-171 (2013)Distributed discovery of frequent subgraphs of a network using MapReduce., and . Computing, 97 (11): 1101-1120 (2015)Effective defense against fingerprinting attack based on autocorrelation property minimization approach., and . J. Intell. Inf. Syst., 54 (2): 341-362 (2020)Towards modeling and runtime verification of self-organizing systems., and . Expert Syst. Appl., (2016)RANGI: A Fast List-Colored Graph Motif Finding Algorithm., , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 10 (2): 504-513 (2013)Fine granular proximity breach prevention during numerical data anonymization., and . Trans. Data Priv., 10 (2): 117-144 (2017)A multilayered approach for link prediction in heterogeneous complex networks., , and . J. Comput. Sci., (2016)