Author of the publication

A Proposed New Endpoint Detection and Response With Image-Based Malware Detection System.

, , , , and . IEEE Access, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Double-sided auctions applied to vertical handover for mobility management in wireless networks., , and . J. Netw. Syst. Manag., 22 (4): 658-681 (2014)Combinatorial double-sided auctions for network bandwidth allocation: a budget-balanced and decentralized approach., and . Ann. des Télécommunications, 67 (5-6): 227-240 (2012)BKIDset - A New Intrusion Detection Dataset To Mitigate The Class Imbalance Problem., , , and . ACOMP, page 106-111. IEEE, (2021)Enhanced Group-Based Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge., , , , , and . CCNC, page 1-5. IEEE, (2009)Optimal Selection and Activation of Intrusion Detection Agents for Wireless Sensor Networks., and . FGCN (1), page 350-355. IEEE Computer Society, (2007)Deep Inductive Transfer Learning Approach for Network Attacks Detection., , , and . ACOMPA, page 64-69. IEEE, (2023)Inter-domain pricing: challenges and possible approaches., and . Int. J. Netw. Manag., 21 (3): 223-246 (2011)Fuzzy-Assisted Mobile Edge Orchestrator and SARSA Learning for Flexible Offloading in Heterogeneous IoT Environment., , , and . Sensors, 22 (13): 4727 (2022)Human extraction from a sequence of depth images using segmentation and foreground detection., , , and . SoICT, page 178-185. ACM, (2014)Hybrid Intrusion Detection System for Wireless Sensor Networks., , and . ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 383-396. Springer, (2007)