Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things., , , , and . CoRR, (2019)Improving End-System Performance with the Use of the QoS Management., and . ICT, volume 3124 of Lecture Notes in Computer Science, page 601-606. Springer, (2004)SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach., , , , , and . Future Internet, 10 (8): 76 (2018)Integrated CAC and scheduling cross-layer algorithms in WiMAX networks with dynamic polling management., and . GLOBECOM Workshops, page 134-139. IEEE, (2012)WUSTL-IIOT-2018., , and . (June 2020)A Real-Time Automatic Plate Recognition System Based on Optical Character Recognition and Wireless Sensor Networks for ITS., , and . Sensors, 20 (1): 55 (2020)Analysis of AeroMACS Data Link for Unmanned Aircraft Vehicles., , and . CoRR, (2019)Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning., , and . CoRR, (2019)Adaptive packet scheduling for the uplink traffic in IEEE 802.16e networks., and . Int. J. Commun. Syst., 26 (8): 1038-1053 (2013)A Proposal of Web Based SNMP Management for Embedded System Applying in Pattern Recognition Using Wavelet Transform., , and . AICT/ICIW, page 202. IEEE Computer Society, (2006)