Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-intrusive speech quality prediction in VoIP networks using a neural network approach., , , and . Neurocomputing, 72 (10-12): 2595-2608 (2009)WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks., , and . J. Sensors, (2016)Towards Optimizing Malware Detection: An Approach Based on Generative Adversarial Networks and Transformers., , , , and . ICCCI, volume 13501 of Lecture Notes in Computer Science, page 598-610. Springer, (2022)Secure Wireless Communication for Mobile Surgical Army Hospitals.. ICWN, page 628-633. CSREA Press, (2008)SAMA: A Comprehensive Smart Automated Malware Analyzer Empowered by ChatGPT Integration., , and . ICT, page 1-6. IEEE, (2024)A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices., , and . Sensors, 22 (6): 2281 (2022)Predicting Different Types of Imbalanced Intrusion Activities Based on a Multi-Stage Deep Learning Approach., , , and . ICIT, page 858-863. IEEE, (2021)Employing Invisible Unicode Characters for Preserving Privacy and Enhancing Communication Security., , and . SSD, page 376-383. IEEE, (2024)CBiLSTM: A Hybrid Deep Learning Model for Efficient Reputation Assessment of Cloud Services., , and . IEEE Access, (2022)An Effective Detection and Classification Approach for DoS Attacks in Wireless Sensor Networks Using Deep Transfer Learning Models and Majority Voting., , , and . ICCCI (CCIS Volume), volume 1653 of Communications in Computer and Information Science, page 180-192. Springer, (2022)