Author of the publication

Capturing-the-Invisible (CTI): Behavior-Based Attacks Recognition in IoT-Oriented Industrial Control Systems.

, , , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PSO assisted OLSR Routing for Cognitive Radio Vehicular Sensor Networks., and . ICIA, page 96:1-96:8. ACM, (2016)Particle Swarm Optimization-Based Energy Efficient Channel Assignment Technique for Clustered Cognitive Radio Sensor Networks., and . Comput. J., 61 (6): 926-936 (2018)Correction to: A smart intuitionistic fuzzy‑based framework for round‑robin short‑term scheduler., , , , , and . J. Supercomput., 78 (4): 4680 (2022)An IoT-Based Novel Hybrid Seizure Detection Approach for Epileptic Monitoring., , , , and . IEEE Trans. Ind. Informatics, 20 (2): 1420-1431 (February 2024)Time dependent network resource optimization in cyber-physical systems using game theory., , and . Comput. Commun., (2021)A hybrid artificial bee colony with whale optimization algorithm for improved breast cancer diagnosis., , , and . Neural Comput. Appl., 33 (20): 13667-13691 (2021)Performance Analysis of Machine Learning Algorithms for Big Data Classification: ML and AI-Based Algorithms for Big Data Analysis., , , , and . Int. J. E Health Medical Commun., 12 (4): 60-75 (2021)Fuzzy-Logic-Inspired Zone-Based Clustering Algorithm for Wireless Sensor Networks., , , , , and . Int. J. Fuzzy Syst., 23 (2): 506-517 (2021)Privacy preserving E-voting cloud system based on ID based encryption., , , , and . Peer-to-Peer Netw. Appl., 14 (4): 2399-2409 (2021)Artificial intelligence inspired energy and spectrum aware cluster based routing protocol for cognitive radio sensor networks., , , , and . J. Parallel Distributed Comput., (2020)