Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine Learning Aided Blockchain Assisted Framework for Wireless Networks., , , , , and . IEEE Netw., 34 (5): 262-268 (2020)Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats., , , , , , and . IEEE Access, (2019)Countermeasures Against Adversarial Examples in Radio Signal Classification., , , , and . CoRR, (2024)Trusted UAV Network Coverage Using Blockchain, Machine Learning, and Auction Mechanisms., , , , , and . IEEE Access, (2020)Joint beamforming and admission control for cache-enabled Cloud-RAN with limited fronthaul capacity., , , , and . IET Signal Process., 14 (5): 278-287 (2020)Network traffic behavior analysis by decomposition into control and data planes., , , and . IPDPS, page 1-8. IEEE, (2008)Comparative evaluation of different classifiers for robust distorted-character recognition., , , and . DRR, volume 6067 of SPIE Proceedings, page 60670O. SPIE, (2006)Periodic Behavior in Botnet Command and Control Channels Traffic., , and . GLOBECOM, page 1-6. IEEE, (2009)Bayesian Optimization-Driven Adversarial Poisoning Attacks Against Distributed Learning., , , and . IEEE Access, (2023)A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection., , , , , and . IEEE Access, (2018)