Author of the publication

Malware detection in edge devices with fuzzy oversampling and dynamic class weighting.

, , , , and . Appl. Soft Comput., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyberattack triage using incremental clustering for intrusion detection systems., , , and . Int. J. Inf. Sec., 19 (5): 597-607 (2020)Abrasion Modeling of Multiple-Point Defect Dynamics for Machine Condition Monitoring., , , and . IEEE Trans. Reliab., 62 (1): 171-182 (2013)Self and static interference mitigation scheme for coexisting wireless networks., , , and . Comput. Electr. Eng., 40 (2): 307-318 (2014)Collateral missing value imputation: a new robust missing value estimation algorithm for microarray data., , and . Bioinform., 21 (10): 2417-2423 (2005)Online Anomaly Detection over Live Social Video Streaming., , , , , and . CoRR, (2024)How to Improve Postgenomic Knowledge Discovery Using Imputation., , , and . EURASIP J. Bioinform. Syst. Biol., (2009)Wake-up timer and binary exponential backoff for ZigBee-based wireless sensor network for flexible movement control system of a self-lifting scaffold., , , , and . Int. J. Distributed Sens. Networks, (2016)Social-connectivity-aware vertical handover for heterogeneous wireless networks., , and . J. Netw. Comput. Appl., 36 (4): 1131-1139 (2013)Multi-Dimensional Adaptive SINR Based Vertical Handoff for Heterogeneous Wireless Networks., , and . IEEE Commun. Lett., 12 (6): 438-440 (2008)Partial Undersampling of Imbalanced Data for Cyber Threats Detection., , and . ACSW, page 9:1-9:4. ACM, (2020)