Author of the publication

Analysis and Identification of Evil Twin Attack through Data Science Techniques Using AWID3 Dataset.

, , , and . MLMI, page 128-135. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adapting a Software Product Line Engineering Process for Certifying Safety Critical Embedded Systems., , , , and . SAFECOMP, volume 7612 of Lecture Notes in Computer Science, page 352-363. Springer, (2012)Comparison and Analysis of Cryptographic Algorithms Aiming Performance Improvement in Secure Web Services., , , and . HASE, page 191-192. IEEE Computer Society, (2011)Analysis and Identification of Evil Twin Attack through Data Science Techniques Using AWID3 Dataset., , , and . MLMI, page 128-135. ACM, (2023)Tiriba - a new approach of UAV based on model driven development and multiprocessors., , , , , and . ICRA, IEEE, (2011)SSPOT-VR: An immersive and affordable mobile application for supporting K-12 students in learning programming concepts., , , , and . Educ. Inf. Technol., 29 (13): 16411-16439 (September 2024)Performance evaluation of security techniques in web services., , , and . iiWAS, page 270-277. ACM, (2011)Using SOA in Critical-Embedded Systems., , , , , and . iThings/CPSCom, page 733-738. IEEE Computer Society, (2011)AVENS - A Novel Flying Ad Hoc Network Simulator with Automatic Code Generation for Unmanned Aircraft System., , , , , , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)Pattern Recognition in Thermal Images of Plants Pine Using Artificial Neural Networks., , , , , , , and . EANN (1), volume 383 of Communications in Computer and Information Science, page 406-413. Springer, (2013)A Parallel Programming Supporting Tool., , , and . PDPTA, CSREA Press, (2000)