Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Building a Masquerade Detection Method Based on User File System Navigation., , , and . MICAI (1), volume 7094 of Lecture Notes in Computer Science, page 174-186. Springer, (2011)On achieving secure seamless mobility., and . MWCN, page 574-578. IEEE, (2002)Intelligent web-phishing detection and protection scheme using integrated features of Images, frames and text., , , and . Expert Syst. Appl., (2019)Optimization of the Establishment of Secure Communication Channels in Wireless Mobile Networks., and . IPDPS, IEEE Computer Society, (2002)The Effect of Nodes Density on Real Time Traffic in Mobile Ad Hoc Network., , , and . ICGS3, IEEE, (2019)Lightweight and Low-Energy Encryption Scheme for Voice over Wireless Devices., , , and . IECON, page 2992-2997. IEEE, (2018)Botnet detection within cloud service provider networks using flow protocols., , and . INDIN, page 1614-1619. IEEE, (2015)Mining sensor data in a smart environment: a study of control algorithms and microgrid testbed for temporal forecasting and patterns of failure., , and . Int. J. Syst. Assur. Eng. Manag., 13 (5): 2371-2390 (2022)Un système d'enseignement à distance basé sur un réseau peer-to-peer., and . RIVF, page 131-136. (2004)Development of a motion analysis system and human-machine interaction through digital image processing and virtual reality., , and . CONIELECOMP, page 284-288. IEEE Computer Society, (2011)