Author of the publication

A Reinforcement Learning Based Algorithm Towards Energy Efficient 5G Multi-Tier Network.

, , and . CCC, page 96-101. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware., , , and . SecNet, volume 381 of Communications in Computer and Information Science, page 177-184. Springer, (2013)Crime Toolkits: The Productisation of Cybercrime., , , , and . TrustCom/ISPA/IUCC, page 1626-1632. IEEE Computer Society, (2013)Cybercrime: The Case of Obfuscated Malware., , , , and . ICGS3/e-Democracy, volume 99 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 204-211. Springer, (2011)Using feature selection for intrusion detection system., , , and . ISCIT, page 296-301. IEEE, (2012)A Comprehensive Protection Method for Securing the Organization's Network Against Cyberattacks., and . CCC, page 118-122. IEEE, (2019)Information Security: Definitions, Threats and Management in Dubai Hospitals Context., and . CCC, page 152-159. IEEE, (2019)Advances in Cybersecurity and Reliability., and . Inf., 15 (6): 361 (June 2024)Roadmap of Concept Drift Adaptation in Data Stream Mining, Years Later., , , , , and . IEEE Access, (2024)Multi-factor based enhancing students' motivations., , and . ICIT, page 1054-1059. IEEE, (2019)Designing Security Intelligent Agent for Petrol Theft Prevention., and . CCC, page 123-128. IEEE, (2019)