Author of the publication

Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues.

, , , , , and . J. Inf. Secur. Appl., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DDSLA-RPL: Dynamic Decision System Based on Learning Automata in the RPL Protocol for Achieving QoS., , , and . IEEE Access, (2021)Characterization and analysis of cloud-to-user latency: The case of Azure and AWS., , , , , and . Comput. Networks, (2021)Benchmarking Class Incremental Learning in Deep Learning Traffic Classification., , , , , , , and . IEEE Trans. Netw. Serv. Manag., 21 (1): 51-69 (February 2024)The Art of Detecting Forwarding Detours., , , , and . IEEE Trans. Netw. Serv. Manag., 18 (3): 3619-3632 (2021)On the Integration of Blockchain and SDN: Overview, Applications, and Future Perspectives., , , , , , , and . CoRR, (2022)Network anomaly detection methods in IoT environments via deep learning: A Fair comparison of performance and robustness., , , , , and . Comput. Secur., (May 2023)New generation satellite broadband Internet services: Should ADSL and 3G worry?, and . INFOCOM, page 3279-3284. IEEE, (2013)Hic Sunt Proxies: Unveiling Proxy Phenomena in Mobile Networks., , , and . TMA, page 227-232. IEEE, (2019)Wi-CR: Human Action Counting and Recognition with Wi-Fi Signals., , , , , and . ICCCS, page 1-8. IEEE, (2019)Challenges and solution for measuring available bandwidth in software defined networks., , , , and . Comput. Commun., (2017)