Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly-based intrusion detection systems: The requirements, methods, measurements, and datasets., , , , , and . Trans. Emerg. Telecommun. Technol., (2021)Evolutionary Random Graph for Bitcoin Overlay and Blockchain Mining Networks., , , and . CoRR, (2022)An optimal cluster-based routing algorithm for UCBSNs., , , , and . Internet Technol. Lett., (2021)2019-2023 in Review: Projecting DDoS Threats With ARIMA and ETS Forecasting Techniques., and . IEEE Access, (2024)XorshiftH128+: A hybrid random number generator for lightweight IoT., , , , , , and . AIBThings, page 1-5. IEEE, (2023)Efficient Cluster based Routing Protocol for Collaborative Body Sensor Networks., , , , and . SENSORNETS, page 94-101. SciTePress, (2019)Application-Aware Fast Dormancy in LTE., , , , and . AINA, page 194-201. IEEE Computer Society, (2014)Blockchain: Trends and future opportunities., and . Internet Technol. Lett., (2019)SCCF Parameter and Similarity Measure Optimization and Evaluation., , , , , and . KSEM (1), volume 11775 of Lecture Notes in Computer Science, page 118-127. Springer, (2019)Comparison of the Non-personalized Active Learning Strategies Used in Recommender Systems., , , , , and . EMCIS, volume 341 of Lecture Notes in Business Information Processing, page 443-456. Springer, (2018)