Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad Hoc Mobile Networks., and . IEEE Trans. Parallel Distributed Syst., 19 (7): 926-939 (2008)SwiftR: Cross-platform ransomware fingerprinting using hierarchical neural networks on hybrid features., , and . Expert Syst. Appl., (September 2023)On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications., , , , , , and . HealthCom, page 205-210. IEEE, (2015)Android Malware Detection using Deep Learning on API Method Sequences., , , and . CoRR, (2017)Cypider: building community-based cyber-defense infrastructure for android malware detection., , , and . ACSAC, page 348-362. ACM, (2016)Intertwined path formation and MAC scheduling for fast delivery of aggregated data in WSN., , , and . Comput. Networks, (2014)A Hybrid Linguistic and Knowledge-Based Analysis Approach for Fake News Detection on Social Media., , , , , and . IEEE Access, (2022)Trust models of internet of smart things: A survey, open issues, and future directions., , , and . J. Netw. Comput. Appl., (2019)Semi-structured and unstructured data aggregation scheduling in wireless sensor networks., , , , and . INFOCOM, page 2671-2675. IEEE, (2012)Balancing the tradeoffs between scalability and availability in mobile ad hoc networks with a flat hashing-based location service., and . Ad Hoc Networks, 6 (7): 1013-1030 (2008)