Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Wu-Manber Pattern Matching Hardware for Intrusion and Malware Detection., , and . CoRR, (2020)Energy-Efficient Region Shift Scheme to Support Mobile Sink Group in Wireless Sensor Networks., , , and . Sensors, 18 (1): 90 (2018)Improving the impact of power efficiency in mobile cloud applications using cloudlet model., , and . Concurr. Comput. Pract. Exp., (2020)Graph-based data management system for efficient information storage, retrieval and processing., , , and . Inf. Process. Manag., 60 (2): 103165 (2023)A survey on network simulators in three-dimensional wireless ad hoc and sensor networks., , and . Int. J. Distributed Sens. Networks, (2016)Bloom Filters Optimized Wu-Manber for Intrusion Detection., , , and . J. Digit. Forensics Secur. Law, 11 (4): 5-22 (2016)Hybrid Neural Network Models for Detecting Fake News Articles., , and . Hum. Centric Intell. Syst., 4 (1): 136-146 (March 2024)Particle Swarm Optimization Based Swarm Intelligence for Active Learning Improvement: Application on Medical Data Classification., , , , , , and . Cogn. Comput., 12 (5): 991-1010 (2020)Detection and Analysis of Drive-by Downloads and Malicious Websites., , , and . CoRR, (2020)IP Lookup using Two-level Indexing and B-Trees., and . International Conference on Internet Computing, page 306-310. CSREA Press, (2010)