From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cost-effective design for binary Edwards elliptic curves crypto-processor over GF (2N) using parallel multipliers and architectures., и . Int. J. Inf. Comput. Secur., 5 (3): 236-250 (2013)Case Study: Monitoring of AIR Quality in King Faisal University Using a Microcontroller and WSN., , и . EUSPN/ICTH, том 21 из Procedia Computer Science, стр. 517-521. Elsevier, (2013)Hate speech detection in the Arabic language: corpus design, construction, and evaluation., , , , , , и . Frontiers Artif. Intell., (2024)Supervised Regression Study for Electron Microscopy Data., и . BIBM, стр. 2661-2668. IEEE, (2019)XAI-PDF: a robust framework for malicious PDF detection leveraging SHAP-based feature engineering., , , и . Int. Arab J. Inf. Technol., 21 (1): 128-146 (2024)Maximizing intrusion detection efficiency for IoT networks using extreme learning machine., и . Discov. Internet Things, 4 (1): 5 (декабря 2024)A Tiny RSA Cryptosystem based on Arduino Microcontroller Useful for Small Scale Networks., , , и . FNC/MobiSPC, том 34 из Procedia Computer Science, стр. 639-646. Elsevier, (2014)Analysis of Extreme Learning Machines (ELMs) for intelligent intrusion detection systems: A survey., , и . Expert Syst. Appl., (2024)Forecasting the Growth of Structures from NMR and X-Ray Crystallography Experiments Released Per Year., и . J. Inf. Knowl. Manag., 19 (1): 2040004:1-2040004:12 (2020)A comprehensive survey on deep learning-based intrusion detection systems in Internet of Things (IoT)., и . Expert Syst. J. Knowl. Eng., (февраля 2025)