Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forensic investigation to detect forgeries in ASF files of contemporary IP cameras., , , , , , and . J. Supercomput., 74 (10): 5060-5081 (2018)AndroKit: A toolkit for forensics analysis of web browsers on android platform., , , , , and . Future Gener. Comput. Syst., (2019)Delay Reduction Through Optimal Controller Placement to Boost Scalability in an SDDC., , , , , and . IEEE Syst. J., 14 (3): 4489-4499 (2020)Carving of the OOXML document from volatile memory using unsupervised learning techniques., , and . J. Inf. Secur. Appl., (2022)A Survey of Network Features for Machine Learning Algorithms to Detect Network Attacks., , and . ACIIDS (2), volume 13758 of Lecture Notes in Computer Science, page 77-88. Springer, (2022)An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling., , , , and . J. Netw. Comput. Appl., (2022)DST-HRS: A topic driven hybrid recommender system based on deep semantics., , , and . Comput. Commun., (2020)Enhancing Insider Threat Detection in Imbalanced Cybersecurity Settings Using the Density-Based Local Outlier Factor Algorithm., , , , , , and . IEEE Access, (2024)Depression Detection Based on Hybrid Deep Learning SSCL Framework Using Self-Attention Mechanism: An Application to Social Networking Data., , , , , and . Sensors, 22 (24): 9775 (2022)Fog computing in internet of things: Practical applications and future directions., , , , and . Peer-to-Peer Netw. Appl., 12 (5): 1236-1262 (2019)