Author of the publication

A two-stage intrusion detection approach for software-defined IoT networks.

, , , , and . Soft Comput., 25 (16): 10935-10951 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Parallel Loop Self-scheduling on Grid Environments., , and . NPC, volume 3222 of Lecture Notes in Computer Science, page 92-100. Springer, (2004)Data Integrity Checking for iSCSI with Dm-verity., , , , , , , and . EMC/HumanCom, volume 260 of Lecture Notes in Electrical Engineering, page 691-697. Springer, (2013)Scheduling for Atomic Broadcast Operation in Heterogeneous Networks with One Port Model., , , and . GPC, volume 5036 of Lecture Notes in Computer Science, page 166-177. Springer, (2008)Performance of Parallel Bit-Reversal with Cilk and UPC for Fast Fourier Transform., , , and . GPC, volume 6104 of Lecture Notes in Computer Science, page 224-233. Springer, (2010)A New Memory Slowdown Model for the Characterization of Computing Systems., , , and . PaCT, volume 4671 of Lecture Notes in Computer Science, page 516-524. Springer, (2007)Performance Analysis of Applying Replica Selection Technology for Data Grid Environments., , , and . PaCT, volume 3606 of Lecture Notes in Computer Science, page 278-287. Springer, (2005)Building a mobile movie recommendation service by user rating and APP usage with linked data on Hadoop., , and . Multimedia Tools Appl., 76 (3): 3383-3401 (2017)A Hybrid Mutual Authentication Scheme Based on Blockchain Technology for WBANs., , , , , and . BlockSys, volume 1156 of Communications in Computer and Information Science, page 350-362. Springer, (2019)Foreword (Special Issue on Applications for High-Performance Systems)., and . Int. J. Comput. Appl. Technol., 22 (1): 1-2 (2005)On the Exploitation of Blockchain for Distributed File Storage., , , , and . J. Sensors, (2020)