Author of the publication

Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms.

, , , and . ITNG, page 559-563. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Face Recognition using Layered Linear Discriminant Analysis and Small Subspace., , , and . CIT, page 1407-1412. IEEE Computer Society, (2010)Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes., , and . ISBAST, page 77-81. IEEE Computer Society, (2012)Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards., , , and . ISBAST, IEEE, (2013)Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement., , , and . ISBAST, page 105-110. IEEE, (2013)Cryptanalysis of a robust smart card authentication scheme for multi-server architecture., , , , and . ISBAST, page 120-123. IEEE, (2014)Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding)., , and . FGIT-BSBT, volume 57 of Communications in Computer and Information Science, page 97-107. Springer, (2009)Secure Instant Messaging Protocol for Centralized Communication Group., , , and . NTMS, page 1-4. IEEE, (2011)Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition., , , , and . ICTC, page 467-471. IEEE, (2010)Two-Directional Two-Dimensional Random Projection and Its Variations for Face and Palmprint Recognition., , , , and . ICCSA (5), volume 6786 of Lecture Notes in Computer Science, page 458-470. Springer, (2011)Application of evolutionary algorithms in detecting SMS spam at access layer., , and . GECCO, page 1787-1794. ACM, (2011)