Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introduction to the Special Issue on Privacy and Security in Evolving Internet of Multimedia Things., , , and . ACM Trans. Multim. Comput. Commun. Appl., 16 (3s): 93:1-93:3 (2020)Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites., , and . EvoApplications, volume 12104 of Lecture Notes in Computer Science, page 117-132. Springer, (2020)Intrusion detection method based on nonlinear correlation measure., , , , , and . Int. J. Internet Protoc. Technol., 8 (2/3): 77-86 (2014)Hybrid Tree-Rule Firewall for High Speed Data Transmission., , , and . IEEE Trans. Cloud Comput., 8 (4): 1237-1249 (2020)Vehicular Computation Offloading for Industrial Mobile Edge Computing., , , , , , and . IEEE Trans. Ind. Informatics, 17 (11): 7871-7881 (2021)A Novel Web Attack Detection System for Internet of Things via Ensemble Classification., , , , , and . IEEE Trans. Ind. Informatics, 17 (8): 5810-5818 (2021)ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System., , , , , and . IEEE Access, (2019)A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis., , , , and . IEEE Trans. Parallel Distributed Syst., 25 (2): 447-456 (2014)A novel flow-vector generation approach for malicious traffic detection., , , , , and . J. Parallel Distributed Comput., (2022)Conceptual Text Region Network: Cognition-Inspired Accurate Scene Text Detection., , , and . CoRR, (2021)