Author of the publication

An electronic warfare approach for deploying a software-based Wi-Fi jammer.

, , and . IC3I, page 43-47. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MaOC: Model-Assisted Optimal Control for Ductless-Split Cooling Systems in Building Environments., and . COMSNETS, page 790-797. IEEE, (2024)Improving Imbalanced Data Classification Through Integrated Data-Level and Algorithm-Level Techniques., , , , and . IC3I, page 442-449. IEEE, (2023)Secure framework against cyber attacks on cyber-physical robotic systems., , , , and . J. Electronic Imaging, (2022)Employing Convolutional Neural Network for IoT Healthcare Attack Detection in Intensive Care Unit., , , and . IC3I, page 798-803. IEEE, (2023)An electronic warfare approach for deploying a software-based Wi-Fi jammer., , and . IC3I, page 43-47. IEEE, (2022)A novel machine learning-based framework for detecting fake Instagram profiles., , , , and . Concurr. Comput. Pract. Exp., (2022)OCSRL: An Model-Based Reinforcement Learning Approach to Optimize Energy Consumption of Cooling Systems., and . e-Science, page 1-10. IEEE, (2023)Demystifying Blockchain in 5G and Beyond Technologies.. J. Mobile Multimedia, 18 (5): 1379-1398 (2022)Quantum Man-in-the-Middle Attacks on QKD Protocols: Proposal of a Novel Attack Strategy., , , , and . IC3I, page 513-519. IEEE, (2023)Investigating Patterns of UAV Attacks for Building Secure UAV Network., , and . IC3I, page 136-141. IEEE, (2023)