Author of the publication

Toward a Better Understanding of Mobile Users' Behavior: A Web Session Repair Scheme.

, , and . IEEE Access, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrinsically Motivated Self-Supervised Deep Sensorimotor Learning for Grasping., , and . IROS, page 3496-3502. IEEE, (2018)Explainable artificial intelligence for cybersecurity: a literature survey., , , , , , , , and . Ann. des Télécommunications, 77 (11-12): 789-812 (2022)Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?, , , , and . RAID, page 93-106. USENIX Association, (2020)Cross Platform IoT- Malware Family Classification based on Printable Strings., , , , , , and . TrustCom, page 775-784. IEEE, (2020)Toward a Better Understanding of Mobile Users' Behavior: A Web Session Repair Scheme., , and . IEEE Access, (2022)Development of Line Post Type Polymer Insulation Arm for 154 kV, , , and . (2000)A Method for Estimating the Number of Diseases in an Image Database: Utilization of Predicates and Application to a CT Database., , , and . NBiS, volume 183 of Lecture Notes on Data Engineering and Communications Technologies, page 197-205. Springer, (2023)Tailored Security: Building Non-Repudiable Security Service Level Agreements, , , , , , and . IEEE Vehicular Technology Magazine, (2013)Multicast source handover scheme based on proxy router discovery., , and . BROADNETS, page 865-874. IEEE, (2005)The Usability of Metadata for Android Application Analysis., , , , , and . ICONIP (1), volume 9947 of Lecture Notes in Computer Science, page 546-554. (2016)