Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey of network anomaly detection techniques., , and . J. Netw. Comput. Appl., (2016)Correction to: Cooperative co‑evolution for feature selection in Big Data with random feature grouping., , , and . J. Big Data, 7 (1): 111 (2020)A combined feature-vector based multiple instance learning convolutional neural network in breast cancer classification from histopathological images., and . Biomed. Signal Process. Control., (July 2023)Biometrics for Internet-of-Things Security: A Review., , , , , and . Sensors, 21 (18): 6163 (2021)A dependable and secure consensus algorithm for blockchain assisted microservice architecture., , , and . Comput. Electr. Eng., 109 (Part B): 108762 (August 2023)An Unsupervised Approach of Knowledge Discovery from Big Data in Social Network.. EAI Endorsed Trans. Scalable Inf. Syst., 4 (14): e3 (2017)MySQL performance analysis on a limited resource server: Fedora vs. Ubuntu Linux., , , and . SpringSim, page 99. SCS/ACM, (2010)Data Analytics-enabled Intrusion Detection: Evaluations of ToN IoT Linux Datasets., , and . TrustCom, page 727-735. IEEE, (2020)Developing a Comprehensive Risk Management Framework for E-Health Care Delivery., and . HIS, volume 14305 of Lecture Notes in Computer Science, page 101-111. Springer, (2023)False Data Injection Attacks in Healthcare., and . AusDM, volume 845 of Communications in Computer and Information Science, page 192-202. Springer, (2017)