Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Anomalous Behavior in Wireless Devices Using Changepoint Analysis., , , , and . ICIOT, page 82-90. IEEE, (2019)Machine Learning Based Malware Detection in Wireless Devices Using Power Footprints., , , , , , and . ISSE, page 1-8. IEEE, (2019)Data Balancing and Hyper-parameter Optimization for Machine Learning Algorithms for Secure IoT Networks., , , and . Q2SWinet, page 71-78. ACM, (2022)Experimental study of energy and bandwidth costs of web advertisements on smartphones., , , and . MobiCASE, page 90-97. IEEE, (2014)Reflection on Software Architecture Practices - What Works, What Remains to Be Seen, and What Are the Gaps., , and . WICSA, page 221-222. IEEE Computer Society, (2005)Google Traces Analysis for Deep Machine Learning Cloud Elastic Model., , , and . SmartNets, page 1-6. IEEE, (2019)A price setting approach to power trading in cognitive radio networks., , , , and . ICUMT, page 878-883. IEEE, (2012)Detection of unknown applications in smartphones: A signal processing perspective., , , , , , and . CCECE, page 1-6. IEEE, (2017)A Power Signal Based Dynamic Approach to Detecting Anomalous Behavior in Wireless Devices., , , , and . MobiWac, page 9-18. ACM, (2018)Real Time Metering of Cloud Resource Reading Accurate Data Source Using Optimal Message Serialization and Format., , , and . IEEE CLOUD, page 476-483. IEEE Computer Society, (2018)