Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel approach for analysis of attack graph., , , and . ISI, page 7-12. IEEE, (2017)Enhancing Sniffing Detection in IoT Home Wi-Fi Networks: An Ensemble Learning Approach With Network Monitoring System (NMS)., , , , and . IEEE Access, (2024)An Adversarial Attack Detection Paradigm With Swarm Optimization., , , , and . IJCNN, page 1-7. IEEE, (2020)A Reinforcement Learning Approach for Attack Graph Analysis., , , and . TrustCom/BigDataSE, page 212-217. IEEE, (2018)An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm., , , , and . Comput., 9 (3): 58 (2020)Enhancing Security Awareness Through Gamified Approaches., , , , , and . CoRR, (2024)Impact of Spreading Factor on LoRaWAN Propagation in a Metropolitan Environment., , , , and . UCET, page 1-4. IEEE, (2020)RTMCH: real-time multichannel MAC for wireless video sensor networks., , and . Multimedia Tools Appl., 78 (6): 7803-7818 (2019)A Practical Approach to Tracking Estimation Using Object Trajectory Linearization., , , and . Int. J. Comput. Intell. Syst., 17 (1): 175 (December 2024)