Author of the publication

A Software Defined Networking Approach for Guaranteeing Delay in Wi-Fi Networks.

, , , , , and . SoICT, page 191-196. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Deep Transfer Learning Approach for Flow-Based Intrusion Detection in SDN-Enabled Network., , , , , , and . SoMeT, volume 337 of Frontiers in Artificial Intelligence and Applications, page 327-339. IOS Press, (2021)Strengthening IDS against Evasion Attacks with GAN-based Adversarial Samples in SDN-enabled network., , , , and . RIVF, page 1-6. IEEE, (2021)A Method of Mutating Windows Malwares using Reinforcement Learning with Functionality Preservation., , , , , and . SoICT, page 142-149. ACM, (2022)A survey on opportunities and challenges of Blockchain technology adoption for revolutionary innovation., , , and . SoICT, page 200-207. ACM, (2018)B-DAC: A decentralized access control framework on Northbound interface for securing SDN using blockchain., , , , and . J. Inf. Secur. Appl., (2022)A Software Defined Networking Approach for Guaranteeing Delay in Wi-Fi Networks., , , , , and . SoICT, page 191-196. ACM, (2019)DA-GAN: Domain Adaptation for Generative Adversarial Networks-assisted Cyber Threat Detection., , , , , and . RIVF, page 29-34. IEEE, (2022)Targeting Bufferbloat in Wi-Fi Networks: An Emulator-based Approach., , , , , and . ISCIT, page 102-107. IEEE, (2019)Forensic analysis of TikTok application to seek digital artifacts on Android smartphone., , , , and . RIVF, page 1-5. IEEE, (2020)A Blockchain-based approach and Attribute-based Encryption for Healthcare Record Data Exchange., , , , and . RIVF, page 65-70. IEEE, (2022)