Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cypider: building community-based cyber-defense infrastructure for android malware detection., , , and . ACSAC, page 348-362. ACM, (2016)Low-Cost and Accurate Intra-flow Contention-Based Admission Control for IEEE 802.11 Ad Hoc Networks.. ADHOC-NOW, volume 5198 of Lecture Notes in Computer Science, page 401-412. Springer, (2008)On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications., , , , , , and . HealthCom, page 205-210. IEEE, (2015)Semi-structured and unstructured data aggregation scheduling in wireless sensor networks., , , , and . INFOCOM, page 2671-2675. IEEE, (2012)Trust models of internet of smart things: A survey, open issues, and future directions., , , and . J. Netw. Comput. Appl., (2019)A Hybrid Linguistic and Knowledge-Based Analysis Approach for Fake News Detection on Social Media., , , , , and . IEEE Access, (2022)Keynote Speaker 6: Intrusion detection systems using machine learning for the security of autonomous vehicles.. SIN, page 1. IEEE, (2022)Authentication for Smart Grid AMI Systems: Threat Models, Solutions, and Challenges., , and . WETICE, page 208-213. IEEE, (2019)CyberSecurity Attack Prediction: A Deep Learning Approach., , , , and . SIN, page 5:1-5:6. ACM, (2020)An OWASP Top Ten Driven Survey on Web Application Protection Methods., , , , and . CRiSIS, volume 12528 of Lecture Notes in Computer Science, page 235-252. Springer, (2020)