Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Machine Learning Cyber Approach for Detecting WannaLocker Ransomware Attack on Android Devices., , , , , and . ICIT, page 135-142. IEEE, (2023)Big Data in Healthcare: A Review on Applications, Technologies, Benefits and Challenges., , and . SSD, page 576-582. IEEE, (2024)New Focus on Ebooks. (2012)A software-defined architecture for control of IoT cyberphysical systems., and . Clust. Comput., 22 (4): 1107-1122 (2019)Outage Performance of Cooperative Systems Under IQ Imbalance., , and . IEEE Trans. Commun., 62 (5): 1480-1489 (2014)Effect of residual acceptors on electron mobility in single asymmetric quantum wells, , , , , and . PHYSICA E-LOW-DIMENSIONAL SYSTEMS & NANOSTRUCTURES, 17 (1-4): 322-323 (2003)International Conference on Superlattices Nano-Structures and Nano-Devices (ICSNN-02), TOULOUSE, FRANCE, JUL 22-26, 2002.Small Wide-Band Printed Inverted-L Antenna with Non-Foster Matching., , , and . IEICE Trans. Commun., 101-B (2): 309-315 (2018)Topological Decomposition of Directed Graphs., and . J. Graph Algorithms Appl., 21 (4): 589-630 (2017)Semi-Synthetic Data for Enhanced SMS Spam Detection: Using Synthetic Minority Oversampling TEchnique SMOTE., and . MEDES, page 206-212. ACM, (2014)On the Performance of Tactical Communication Interception Using Military Full Duplex Radios., , , , and . PIMRC, page 1-6. IEEE, (2019)