Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sense through wall human detection using UWB radar., , , and . EURASIP J. Wireless Comm. and Networking, (2011)Optimized Deep Ensemble Technique for Malicious Behavior Classification in Cloud., , and . Cybern. Syst., 54 (6): 859-887 (August 2023)Poly Logarithmic Naive Bayes Intrusion Detection System Using Linear Stable PCA Feature Extraction.. Wirel. Pers. Commun., 125 (4): 3117-3132 (2022)A Study on Various Attacks and Detection Methodologies in Software Defined Networks., and . Wireless Personal Communications, 114 (1): 675-697 (2020)DDoS Attack Detection in SDN: Optimized Deep Convolutional Neural Network with Optimal Feature Set., and . Wirel. Pers. Commun., 125 (3): 2781-2797 (2022)Performance Analysis of Modified AODV Routing Protocol With Lifetime Extension of Wireless Sensor Networks., , and . IEEE Access, (2020)Electricity Demand Forecasting Using Neural Networks., and . IDEAL, volume 2690 of Lecture Notes in Computer Science, page 826-834. Springer, (2003)Aspects to determine the acceptance of cloud service: A study of cloud professionals., and . ICCCNT, page 1-7. IEEE, (2023)A Novel Feature Vector for AI-Assisted Windows Malware Detection., , , , , , , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 355-361. IEEE, (2023)Augmenting network lifetime for heterogenous WSN assisted IoT using mobile agent., , and . Wirel. Networks, 26 (8): 5965-5979 (2020)