Author of the publication

Automatic Discovery of Network Applications: A Hybrid Approach.

, , , and . Canadian Conference on AI, volume 6085 of Lecture Notes in Computer Science, page 208-219. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OTP-IoT: An ownership transfer protocol for the Internet of Things., , , , and . J. Inf. Secur. Appl., (2018)A Rule-based Temporal Alert Correlation System., and . Int. J. Netw. Secur., 5 (1): 66-72 (2007)Transferability of Machine Learning Algorithm for IoT Device Profiling and Identification., , , , , , and . IEEE Internet Things J., 11 (2): 2322-2335 (January 2024)Secure and Efficient Probabilistic Skyline Computation for Worker Selection in MCS., , , , and . IEEE Internet Things J., 7 (12): 11524-11535 (2020)QKeyShield: A Practical Receiver-Device-Independent Entanglement-Swapping-Based Quantum Key Distribution., , and . IEEE Access, (2022)Are You a Cyborg, Bot or Human? - A Survey on Detecting Fake News Spreaders., , , , , and . IEEE Access, (2022)Multimodal Fake News Analysis Based on Image-Text Similarity., , , , and . IEEE Trans. Comput. Soc. Syst., 11 (1): 959-972 (February 2024)Social Alignment Contagion in Online Social Networks., , , , , , and . IEEE Trans. Comput. Soc. Syst., 11 (1): 399-417 (February 2024)The analysis and management of non-canonical requirement specifications through a belief integration game., and . Knowl. Inf. Syst., 22 (1): 27-64 (2010)A real-time hostile activities analyses and detection system., , , , and . Appl. Soft Comput., (2021)