Author of the publication

Ransomware Attacks Detection Methodology to Protect IoT-Enabled Critical Infrastructures.

, , , , , , , and . GLOBECOM, page 6037-6042. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Heart Disease Detection using Vision-Based Transformer Models from ECG Images., , , and . CoRR, (2023)Amalgamation of Advanced Technologies for Sustainable Development of Smart City Environment: A Review., , , , , , and . IEEE Access, (2021)ExGate: Externally Controlled Gating for Feature-based Attention in Artificial Neural Networks., and . CoRR, (2018)Machine Learning Techniques to Detect and Characterise Whistler Radio Waves., , and . CoRR, (2020)Multi-carrier Based Radar Signal Optimization Using Genetic Algorithm., and . SocProS (1), volume 258 of Advances in Intelligent Systems and Computing, page 525-534. Springer, (2013)Metaheuristic Optimisation for Radio Interface-Constrained Channel Assignment in a Hybrid Wi-Fi-Dynamic Spectrum Access Wireless Mesh Network., , , and . CrownCom/WiCON, volume 427 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 56-76. Springer, (2021)Special issue on collaborative edge computing for secure and scalable Internet of Things., , and . Softw. Pract. Exp., 54 (7): 1215-1216 (2024)Waveform processing-domain diversity and ATR., , and . EUSIPCO, page 431-435. IEEE, (2011)Impact of Weather Predictions on COVID-19 Infection Rate by Using Deep Learning Models., , , , , , , , and . Complex., (2021)Designing Blockchain-Based Decentralized Scheme for Secure File Storage System., , , , and . CITS, page 1-7. IEEE, (2024)