Author of the publication

A New SVM-Based Fraud Detection Model for AMI.

, , , and . SAFECOMP, volume 9922 of Lecture Notes in Computer Science, page 226-237. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Three-Pass Protocol for Cryptography Based on Padding for Wireless Networks., , , and . CCNC, page 287-291. IEEE, (2007)Power Efficient Error Control for Bluetooth-based Sensor Networks., , and . LCN, page 284-293. IEEE Computer Society, (2005)Evaluating and improving Bluetooth piconet performance over Nakagami-m fading channels., , and . ISCC, page 639-644. IEEE Computer Society, (2004)A New SVM-Based Fraud Detection Model for AMI., , , and . SAFECOMP, volume 9922 of Lecture Notes in Computer Science, page 226-237. Springer, (2016)Performance of a Partial Retransmissions Hybrid ARQ Scheme in Rayleigh Block Fading Channels., , , and . VTC Spring, page 1-5. IEEE, (2011)Unequal error protection for LZSS compressed data using Reed-Solomon codes., , , and . IET Commun., 1 (4): 612-617 (2007)A Study on Publish-Subscribe Middlewares for Selective Notification Delivery in Smart Cities., , and . CLEI, page 1-10. IEEE, (2019)Using Cognitive Radio for Improving the Capacity of Wireless Mesh Networks., , and . VTC Fall, page 1-5. IEEE, (2008)Defining Reusable Business-Level QoS Policies for DiffServ., , and . DSOM, volume 3278 of Lecture Notes in Computer Science, page 40-51. Springer, (2004)A Machine Learning Approach for Detecting Spoofing Attacks in Wireless Sensor Networks., , , , and . AINA, page 752-758. IEEE Computer Society, (2018)