Author of the publication

Securing a mobile adhoc network from routing attacks through the application of genetic algorithm

, , and . CoRR, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing a mobile adhoc network from routing attacks through the application of genetic algorithm, , and . CoRR, (2012)Using common-sense knowledge-base for detecting word obfuscation in adversarial communication., and . COMSNETS, page 1-6. IEEE, (2015)Copyright Infringement Detection of Music Videos on YouTube by Mining Video and Uploader Meta-data., and . BDA, volume 8302 of Lecture Notes in Computer Science, page 48-67. Springer, (2013)Malware Detection Using Machine Learning and Deep Learning., , , and . BDA, volume 11297 of Lecture Notes in Computer Science, page 402-411. Springer, (2018)A scientometric analysis of 9 ACM SIGWEB cooperating conferences., , and . SIGWEB Newsl., 2016 (Autumn): 6:1-6:15 (2016)Predicting ATP binding sites in protein sequences using Deep Learning and Natural Language Processing., and . CoRR, (2024)Topic-Specific YouTube Crawling to Detect Online Radicalization., and . DNIS, volume 8999 of Lecture Notes in Computer Science, page 133-151. Springer, (2015)Isn't It Ironic, Don't You Think?, and . ICONIP (4), volume 13111 of Lecture Notes in Computer Science, page 526-536. Springer, (2021)Role of Author Personality Traits for Identifying Intent Based Racist Posts., and . EISIC, page 197. IEEE Computer Society, (2016)Investigating the Dynamics of Religious Conflicts by Mining Public Opinions on Social Media., and . PAKDD (1), volume 10234 of Lecture Notes in Computer Science, page 421-433. (2017)