From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model., , , и . Symmetry, 12 (5): 754 (2020)Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique., , , , , и . Comput. Syst. Sci. Eng., 44 (1): 859-872 (2023)Deep Ensemble Fake News Detection Model Using Sequential Deep Learning Technique., , , , и . Sensors, 22 (18): 6970 (2022)A Hybrid Cryptographic Mechanism for Secure Data Transmission in Edge AI Networks., , , и . Int. J. Comput. Intell. Syst., 17 (1): 24 (декабря 2024)Mobile Deep Learning: Exploring Deep Neural Network for Predicting Context-Aware Smartphone Usage., , , , и . SN Comput. Sci., 2 (3): 146 (2021)An Integrated Approach of Fuzzy Logic, AHP and TOPSIS for Estimating Usable-Security of Web Applications., , , , , и . IEEE Access, (2020)Key Issues in Healthcare Data Integrity: Analysis and Recommendations., , , , , , и . IEEE Access, (2020)A Comprehensive Study of Commonly Practiced Heavy and Light Weight Software Methodologies, , и . CoRR, (2011)Novel Component-Based Development Model for SIP-Based Mobile Application (1202)., , , и . CoRR, (2012)A Comprehensive Study of Commonly Practiced Heavy & Light Weight Software Methodologies, , и . CoRR, (2012)