Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing communication and collaboration through integrated internet and intranet architecture., , and . SIGDOC, page 91-100. ACM, (2013)Secure Data Communication in Autonomous V2X Systems., , , , , and . ICIOT, page 156-163. IEEE Computer Society, (2018)(WIP) Blockhub: Blockchain-Based Software Development System for Untrusted Environments., , , , , , , and . IEEE CLOUD, page 582-585. IEEE Computer Society, (2018)DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters., , , , , , and . ACSOS, page 109-118. IEEE, (2020)Machine Learning Models to Enhance the Science of Cognitive Autonomy., , , , , and . AIKE, page 46-53. IEEE Computer Society, (2018)CORP: An Efficient Protocol to Prevent Data Loss in Mobile Ad-hoc Networks.. AINA Workshops, page 817-824. IEEE Computer Society, (2013)Incremental Learning through Graceful Degradations in Autonomous Systems., , and . ICCC, page 25-32. IEEE Computer Society, (2018)Malware Speaks! Deep Learning Based Assembly Code Processing for Detecting Evasive Cryptojacking., , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 2461-2477 (July 2024)Scalable Deep Learning through Fuzzy-Based Clustering in Autonomous Systems., , and . AIKE, page 146-151. IEEE Computer Society, (2018)Autonomous Aggregate Data Analytics in Untrusted Cloud., , , , and . AIKE, page 138-141. IEEE Computer Society, (2018)