Author of the publication

Detection of Anomalous Behavior in Wireless Devices Using Changepoint Analysis.

, , , , and . ICIOT, page 82-90. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of anomalous behavior of smartphones using signal processing and machine learning techniques., , , , , , and . PIMRC, page 1-7. IEEE, (2017)Efficient Algorithms For Selection And Sorting Of Large Distributed Files On De Bruijn And Hypercube Structures., , , and . Int. J. Found. Comput. Sci., 14 (6): 1129-1146 (2003)Peer to peer content sharing on ad hoc networks of smartphones., , and . IWCMC, page 1445-1450. IEEE, (2011)MultiDroid: An Energy Optimization Technique for Multi-Window Operations on OLED Smartphones., , , and . IEEE Access, (2018)Scalable Update Propagation in Partially Replicated, Disconnected Client Server Databases., , and . ICEIS (1), page 11-21. (2006)Generation of Adaptive Test Cases from Nondeterministic Finite State Models., and . Protocol Test Systems, volume C-11 of IFIP Transactions, page 309-320. North-Holland, (1992)A CPU-based algorithm for traffic optimization based on sparse convolutional neural networks., , , , and . CCECE, page 1-5. IEEE, (2017)Analysis of packet interference and aggregated throughput in a cluster of Bluetooth piconets under different traffic conditions., , , and . IEEE J. Sel. Areas Commun., 23 (6): 1205-1218 (2005)Skipping technique in face routing for wireless ad hoc and sensor networks., and . Int. J. Sens. Networks, 4 (1/2): 92-103 (2008)An Evolutionary SVM Model for DDOS Attack Detection in Software Defined Networks., , , , , , and . IEEE Access, (2020)