Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process., , , and . Secur. Commun. Networks, 9 (16): 3483-3495 (2016)Multi-Tenant Intrusion Detection Framework as a Service for SaaS., , , and . IEEE Trans. Serv. Comput., 15 (5): 2925-2938 (2022)Selective Mobile Cloud Offloading to Augment Multi-Persona Performance and Viability., , , and . IEEE Trans. Cloud Computing, 7 (2): 314-328 (2019)TD-PSO: Task distribution approach based on particle swarm optimization for vehicular ad hoc network., , , and . Trans. Emerg. Telecommun. Technol., (2022)Independent and Identically Distributed (IID) Data Assessment in Federated Learning., , , , , and . GLOBECOM, page 293-298. IEEE, (2022)ModularFed: Leveraging Modularity in Federated Learning Frameworks., , , , , and . CoRR, (2022)Combining heterogeneous anomaly detectors for improved software security., , , and . J. Syst. Softw., (2018)An anomaly detection system based on variable N-gram features and one-class SVM., , , and . Inf. Softw. Technol., (2017)ITADP: An inter-tenant attack detection and prevention framework for multi-tenant SaaS., , and . J. Inf. Secur. Appl., (2019)P-Code Based Classification to Detect Malicious VBA Macro., and . ISNCC, page 1-6. IEEE, (2020)