Author of the publication

Detection of Anomalous Behavior in Wireless Devices Using Changepoint Analysis.

, , , , and . ICIOT, page 82-90. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Learning Based Approach for Classifying Power Signals and Detecting Anomalous Behavior of Wireless Devices., , and . SERVICES, page 92-98. IEEE, (2019)A Strongly Non-Intrusive Methodology to Monitor and Detect Anomalous Behaviour of Wireless Devices., , , , and . ISSE, page 1-8. IEEE, (2020)Detection of Anomalous Behavior in Wireless Devices Using Changepoint Analysis., , , , and . ICIOT, page 82-90. IEEE, (2019)Machine Learning Based Malware Detection in Wireless Devices Using Power Footprints., , , , , , and . ISSE, page 1-8. IEEE, (2019)Time Series Forecasting using Facebook Prophet for Cloud Resource Management., , , and . ICC Workshops, page 1-6. IEEE, (2021)Data Balancing and CNN based Network Intrusion Detection System., , , and . WCNC, page 1-6. IEEE, (2023)Design of a Machine Learning Based Intrusion Detection Framework and Methodology for IoT Networks., , , , and . CCWC, page 191-198. IEEE, (2022)Analytical Modeling and Prediction of Cloud Workload., , , and . ICC Workshops, page 1-6. IEEE, (2021)FedChallenger: Challenge-Response-Based Defence for Federated Learning Against Byzantine Attacks., , , , , and . GLOBECOM, page 3843-3848. IEEE, (2023)Towards Developing a Robust Intrusion Detection Model Using Hadoop-Spark and Data Augmentation for IoT Networks., , , , and . Sensors, 22 (20): 7726 (2022)