Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel intrusion detection framework for Wireless Sensor Networks., , and . IAS, page 350-353. IEEE, (2011)An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications., , and . Appl. Soft Comput., 13 (4): 1978-1996 (2013)Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: A Survey and Open Issues., , and . Sensors, 13 (8): 10087-10122 (2013)LEACH-CR: Energy Saving Hierarchical Network Protocol Based on Low-Energy Adaptive Clustering Hierarchy for Wireless Sensor Networks., , and . CRC, page 1-6. IEEE, (2021)Adaptive and online data anomaly detection for wireless sensor systems., , and . Knowl. Based Syst., (2014)Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense., and . Future Internet, 15 (2): 62 (February 2023)A Voice Morphing Model Based on the Gaussian Mixture Model and Generative Topographic Mapping., , , , , , and . IRICT, volume 1073 of Advances in Intelligent Systems and Computing, page 396-406. Springer, (2019)One-Class Principal Component Classifier for anomaly detection in wireless sensor network., , and . CASoN, page 271-276. IEEE, (2012)Utilization of Millimeter-Wave Spectrum in Wireless Networks., , and . Wirel. Commun. Mob. Comput., (2018)Lightweight Anomaly Detection Scheme Using Incremental Principal Component Analysis and Support Vector Machine., , , , , and . Sensors, 21 (23): 8017 (2021)