Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Anomalous Behavior in Wireless Devices Using Changepoint Analysis., , , , and . ICIOT, page 82-90. IEEE, (2019)Machine Learning Based Malware Detection in Wireless Devices Using Power Footprints., , , , , , and . ISSE, page 1-8. IEEE, (2019)Data Balancing and Hyper-parameter Optimization for Machine Learning Algorithms for Secure IoT Networks., , , and . Q2SWinet, page 71-78. ACM, (2022)Experimental study of energy and bandwidth costs of web advertisements on smartphones., , , and . MobiCASE, page 90-97. IEEE, (2014)Google Traces Analysis for Deep Machine Learning Cloud Elastic Model., , , and . SmartNets, page 1-6. IEEE, (2019)Reflection on Software Architecture Practices - What Works, What Remains to Be Seen, and What Are the Gaps., , and . WICSA, page 221-222. IEEE Computer Society, (2005)A price setting approach to power trading in cognitive radio networks., , , , and . ICUMT, page 878-883. IEEE, (2012)A Power Signal Based Dynamic Approach to Detecting Anomalous Behavior in Wireless Devices., , , , and . MobiWac, page 9-18. ACM, (2018)Localized detection of k-connectivity in wireless ad hoc, actuator and sensor networks., , , , and . ICCCN, page 33-38. IEEE, (2007)Point Estimator Log Tracker for Cloud Monitoring., , , and . INFOCOM Workshops, page 62-67. IEEE, (2019)