Author of the publication

Wireless Anomaly Detection Based on IEEE 802.11 Behavior Analysis.

, , , and . IEEE Trans. Inf. Forensics Secur., 10 (10): 2158-2170 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interpretive Performance Prediction for Parallel Application Development., and . J. Parallel Distributed Comput., 60 (1): 17-47 (2000)Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain., , , , , , and . IEEE Access, (2019)A Mobility-Aware Human-Centric Cyber-Physical System for Efficient and Secure Smart Healthcare., , , , , , , and . IEEE Internet Things J., 9 (22): 22434-22452 (2022)Effective Wireless Communication Architecture for Resisting Jamming Attacks., , , and . IEEE Access, (2020)Efficacy of modeling & simulation in defense life cycle engineering., and . SCSC, page 1105-1111. Simulation Councils, Inc., (2007)BioRAC: biologically inspired resilient autonomic cloud., , and . CSIIRW, page 80. ACM, (2011)CLaaS: Cybersecurity Lab as a Service., and . J. Internet Serv. Inf. Secur., 5 (4): 41-59 (2015)A Comparative Statistical Error Analysis of Neuronavigation Systems in a Clinical Setting., , , , , , and . MICCAI, volume 1935 of Lecture Notes in Computer Science, page 144-153. Springer, (2000)Paralinguistic Classification of Mask Wearing by Image Classifiers and Fusion., and . INTERSPEECH, page 2087-2091. ISCA, (2020)Energy-efficient and secure mobile fog-based cloud for the Internet of Things., , , , , and . Future Gener. Comput. Syst., (2022)