Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach., and . Comput. Secur., (2022)VoIPChain: A decentralized identity authentication in Voice over IP using Blockchain., , , and . Comput. Commun., (2023)A New Geometric Data Perturbation Method for Data Anonymization Based on Random Number Generators., , and . J. Web Eng., (2021)Intrusion Detection with Comparative Analysis of Supervised Learning Techniques and Fisher Score Feature Selection Algorithm., , , and . ISCIS, volume 935 of Communications in Computer and Information Science, page 141-149. Springer, (2018)IEEE 802.11 s Mesh Network Analysis for Post Disaster Communication, , , and . International Telecommunications Conference, page 53--59. Springer, Singapore, (2019)A Survey on Backbone Attack., , , , and . ISDFS, page 1-5. IEEE, (2019)Optimal joint load balancing and EDCA configuration of IEEE 802.11 wireless hotspots., , and . Int. J. Commun. Syst., (2018)Fingerprint Liveness Detection Using Deep Learning., , , and . FiCloud, page 129-135. IEEE, (2022)A framework for modeling and implementing QoS-aware load balancing solutions in WiFi hotspots., , , , and . ISWCS, page 33-38. IEEE, (2014)An Efficient Big Data Anonymization Algorithm Based on Chaos and Perturbation Techniques., , , and . Entropy, 20 (5): 373 (2018)