Author of the publication

Efficient models for enhancing the link adaptation performance of LTE/LTE-A networks.

, , , , , and . EURASIP J. Wirel. Commun. Netw., 2022 (1): 10 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion Detection Systems of ICMPv6-based DDoS attacks., , , and . Neural Comput. Appl., 30 (1): 45-56 (2018)Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection Mechanisms., , , and . IEEE Access, (2021)Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks., , , , and . IEEE Access, (2023)Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review., , , , , , and . IEEE Access, (2022)Hybrid Monitoring Technique for Detecting Abnormal Behaviour in RPL-Based Network., , , and . J. Commun., 13 (5): 198-208 (2018)A Review of Peer-to-Peer Botnet Detection Techniques., , , , and . J. Comput. Sci., 10 (1): 169-177 (2014)A Proposed Framework for Outsourcing and Secure Encrypted Data on OpenStack Object Storage (Swift)., , and . J. Comput. Sci., 11 (3): 590-597 (2015)Efficient models for enhancing the link adaptation performance of LTE/LTE-A networks., , , , , and . EURASIP J. Wirel. Commun. Netw., 2022 (1): 10 (2022)COVID-19 Automatic Detection Using Deep Learning., , and . Comput. Syst. Sci. Eng., 39 (1): 15-35 (2021)Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges., , , , and . Comput. Syst. Sci. Eng., 40 (1): 87-112 (2022)