Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blind-trust: Raising awareness of the dangers of using unsecured public Wi-Fi networks., , , , and . Comput. Commun., (September 2023)A hybrid anomaly-based intrusion detection system to improve time complexity in the Internet of Energy environment., , , and . J. Parallel Distributed Comput., (2020)Human activity recognition based on an amalgamation of CEV & SGM features., , , and . J. Intell. Fuzzy Syst., 43 (6): 7351-7362 (2022)Efficient Non-Linear Covert Channel Detection in TCP Data Streams., , , , and . IEEE Access, (2020)Cortex-inspired ensemble based network intrusion detection system., , , and . Neural Comput. Appl., 35 (21): 15415-15428 (July 2023)Intelligent intrusion detection system in smart grid using computational intelligence and machine learning., , , , and . Trans. Emerg. Telecommun. Technol., (2021)Detecting Intrusions in Federated Cloud Environments Using Security as a Service., , and . DeSE, page 91-96. IEEE, (2015)A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions., , , , , and . IEEE Access, (2022)Robust spatial fuzzy GMM based MRI segmentation and carotid artery plaque detection in ultrasound images., , , , and . Comput. Methods Programs Biomed., (2019)Revocable, Decentralized Multi-Authority Access Control System., , , and . UCC Companion, page 220-225. IEEE, (2018)