Author of the publication

Support Vector Machine-Based Classification of Malicious Users in Cognitive Radio Networks.

, , , , , and . Wirel. Commun. Mob. Comput., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cognitive User Selection Based on Throughput Estimation in Cognitive Radio Networks., , , , and . ICTC, page 154-156. IEEE, (2020)Support Vector Machine-Based Classification of Malicious Users in Cognitive Radio Networks., , , , , and . Wirel. Commun. Mob. Comput., (2020)WhatsApp Network Forensics: Discovering the IP Addresses of Suspects., , , , and . NTMS, page 1-7. IEEE, (2021)A Server Based ASR Approach to Automated Cryptanalysis of Two Time Pads in Case of Speech., and . IAS, page 103-107. IEEE Computer Society, (2008)Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications., , , , and . Ann. des Télécommunications, 78 (3-4): 183-208 (April 2023)Random fixed point theorems for multivalued acyclic random maps, and . Stochastic Analysis and Applications, 17 (5): 835--840 (1999)Exploiting Silence for Ciphertext Only Cryptanalysis of Stream Ciphered Digitized Voice., , and . Security and Management, page 157-164. CSREA Press, (2007)Random fixed point theorems for composites of acyclic multifunctions. Stochastic Analysis and Applications, 19 (6): 925--931 (2001)Security Assessment for Zenbo Robot Using Drozer and mobSF Frameworks., , , , and . NTMS, page 1-7. IEEE, (2021)Forensic Analysis of the Cisco WebEx Application., , , , and . CSNet, page 90-97. IEEE, (2021)