Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Foreword: Special Issue on Trends in Artificial Intelligence and Data Analytics for an Ethical and Inclusive Digitalized Society., , , and . Int. J. Uncertain. Fuzziness Knowl. Based Syst., (2021)Cybercrime Victimisations/Criminalisation and Punishment., , and . ICGS3, volume 92 of Communications in Computer and Information Science, page 55-62. Springer, (2010)Accelerated Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks., , , and . CSE, page 633-639. IEEE Computer Society, (2012)Deep Learning Approach for Intelligent Intrusion Detection System., , , , , and . IEEE Access, (2019)Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities., , , and . Trustcom/BigDataSE/ISPA, page 1782-1787. IEEE, (2016)Fast authentication in wireless sensor networks., , , , and . Future Gener. Comput. Syst., (2016)ARP Cache Poisoning Mitigation and Forensics Investigation., , , and . TrustCom/BigDataSE/ISPA (1), page 1392-1397. IEEE, (2015)Securing Address Registration in Location/ID Split Protocol Using ID-Based Cryptography., , and . WWIC, volume 7889 of Lecture Notes in Computer Science, page 129-139. Springer, (2013)An Analysis of Honeypot Programs and the Attack Data Collected., and . ICGS3, volume 534 of Communications in Computer and Information Science, page 228-238. Springer, (2015)Variance Ranking for Multi-Classed Imbalanced Datasets: A Case Study of One-Versus-All., , , , , , and . Symmetry, 11 (12): 1504 (2019)