Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges., , , and . CoRR, (2021)Building Heating and Cooling Load Prediction Using Ensemble Machine Learning Model., , , , , , and . Sensors, 22 (19): 7692 (2022)A Comprehensive Review of Denial of Service Attacks in Blockchain Ecosystem and Open Challenges., , , , , , , and . IEEE Access, (2022)A multi-view feature fusion approach for effective malware classification using Deep Learning., , and . J. Inf. Secur. Appl., (2023)Blockchain-Based Cloud-Enabled Security Monitoring Using Internet of Things in Smart Agriculture., , , , and . Future Internet, 14 (9): 250 (2022)EfficientNet deep learning meta-classifier approach for image-based android malware detection., and . Multim. Tools Appl., 82 (16): 24891-24917 (July 2023)Recent trends in Social Engineering Scams and Case study of Gift Card Scam., , , and . CoRR, (2021)Image-based malware representation approach with EfficientNet convolutional neural networks for effective malware classification., , and . J. Inf. Secur. Appl., (2022)Deep Learning Feature Fusion Approach for an Intrusion Detection System in SDN-Based IoT Networks., , and . IEEE Internet Things Mag., 5 (2): 24-29 (2022)A Multi-View attention-based deep learning framework for malware detection in smart healthcare systems., , , and . Comput. Commun., (2022)