Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TKN: An efficient approach for discovering top-k high utility itemsets with positive or negative profits., , , and . Inf. Sci., (2022)Efficient Detection of Attacks in SIP Based VoIP Networks Using Linear l1-SVM Classifier., , , , and . Int. J. Comput. Commun. Control, 14 (4): 518-529 (2019)An eco-friendly routing protocol for Delay Tolerant Networks., , and . WiMob, page 450-457. IEEE Computer Society, (2010)A performance comparison of delay-tolerant network routing protocols., , , , and . IEEE Netw., 30 (2): 46-53 (2016)Reliable Web Services Approaches of Mobile CloudComputing: A Comparative study., , and . CoRR, (2022)RMAWS: An Hybrid Architecture for achieving Web Services Reliability in Mobile Cloud Computing., , and . CoRR, (2022)A Robust Privacy Preserving Approach for Sanitizing Transaction Databases from Sensitive High Utility Patterns., , , and . AISI, volume 152 of Lecture Notes on Data Engineering and Communications Technologies, page 381-394. Springer, (2022)Using fuzzy logic to calculate the Backoff Interval for contention-based vehicular networks., , and . IWCMC, page 783-788. IEEE, (2011)An integrated three-tier trust management framework in mobile edge computing using fuzzy logic., , , and . PeerJ Comput. Sci., (2021)A Localized Adaptive Strategy to Calculate the Backoff Interval in Contention-Based Vehicular Networks., and . IEEE Access, (2014)