Author of the publication

Using MapReduce and hierarchical entropy analysis to speed-up the detection of covert timing channels.

, , , and . IWCMC, page 1102-1107. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards extended safety in connected vehicles., , , and . ITSC, page 652-657. IEEE, (2013)Reinforcement learning for resource provisioning in the vehicular cloud., , and . IEEE Wirel. Commun., 23 (4): 128-135 (2016)Explainable, trustworthy, and ethical machine learning for healthcare: A survey., , , , , and . Comput. Biol. Medicine, (2022)Deep Reinforcement Learning for Radio Resource Allocation and Management in Next Generation Heterogeneous Wireless Networks: A Survey., , , , and . CoRR, (2021)Deriving Emotions and Sentiments from Visual Content: A Disaster Analysis Use Case., , , and . CoRR, (2020)Constructing an Efficient Mobility Profile of Ad-Hoc Node for Mobility-Pattern-Based Anomaly Detection in MANET., , , and . GLOBECOM, IEEE, (2006)From Channel Selection to Strategy Selection: Enhancing VANETs Using Socially-Inspired Foraging and Deference Strategies., , , , and . IEEE Trans. Veh. Technol., 67 (9): 8919-8933 (2018)A new generic model for signal propagation in Wi-Fi and WiMAX environments., , , and . Wireless Days, page 1-5. IEEE, (2008)Using Energy-Efficient Overlays to Reduce Packet Error Rates in Wireless Ad-Hoc Networks., , , , and . ICC, page 3717-3722. IEEE, (2006)Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems., , , , and . IWCMC, page 78-83. IEEE, (2019)