Author of the publication

Novel anomaly detection and classification schemes for Machine-to-Machine uplink.

, , and . IEEE BigData, page 1284-1289. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying graphics processor acceleration in a software defined radio prototyping environment., , , , and . International Symposium on Rapid System Prototyping, page 67-73. IEEE, (2011)Resource management with anti-jamming capability for cognitive space communication systems., , and . MILCOM, page 144-149. IEEE, (2016)Utility Proportional Fairness Resource Allocation with Carrier Aggregation in 4G-LTE., , and . MILCOM, page 412-417. IEEE, (2013)A price selective centralized algorithm for resource allocation with carrier aggregation in LTE cellular networks., , and . WCNC, page 813-818. IEEE, (2015)Novel anomaly detection and classification schemes for Machine-to-Machine uplink., , and . IEEE BigData, page 1284-1289. IEEE, (2018)A hidden Markov model detection of malicious Android applications at runtime., , , , and . WOCC, page 1-6. IEEE, (2014)Spectrum sharing between public safety and commercial users in 4G-LTE., , and . ICNC, page 674-679. IEEE, (2014)Intrusion Detection System for Applications Using Linux Containers., , and . STM, volume 9331 of Lecture Notes in Computer Science, page 123-135. Springer, (2015)Vectorization and mapping of software defined radio applications on heterogeneous multi-processor platforms., , , , and . SiPS, page 31-36. IEEE, (2011)Radar inband and out-of-band interference into LTE macro and small cell uplinks in the 3.5 GHz band., , , , and . WCNC, page 1829-1834. IEEE, (2015)