From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detection of Anomalous Behavior in Wireless Devices Using Changepoint Analysis., , , , и . ICIOT, стр. 82-90. IEEE, (2019)Towards Developing a Robust Intrusion Detection Model Using Hadoop-Spark and Data Augmentation for IoT Networks., , , , и . Sensors, 22 (20): 7726 (2022)Experimental study of energy and bandwidth costs of web advertisements on smartphones., , , и . MobiCASE, стр. 90-97. IEEE, (2014)Machine Learning Based Malware Detection in Wireless Devices Using Power Footprints., , , , , , и . ISSE, стр. 1-8. IEEE, (2019)Data Balancing and Hyper-parameter Optimization for Machine Learning Algorithms for Secure IoT Networks., , , и . Q2SWinet, стр. 71-78. ACM, (2022)Google Traces Analysis for Deep Machine Learning Cloud Elastic Model., , , и . SmartNets, стр. 1-6. IEEE, (2019)A price setting approach to power trading in cognitive radio networks., , , , и . ICUMT, стр. 878-883. IEEE, (2012)Reflection on Software Architecture Practices - What Works, What Remains to Be Seen, and What Are the Gaps., , и . WICSA, стр. 221-222. IEEE Computer Society, (2005)Detection of unknown applications in smartphones: A signal processing perspective., , , , , , и . CCECE, стр. 1-6. IEEE, (2017)A Power Signal Based Dynamic Approach to Detecting Anomalous Behavior in Wireless Devices., , , , и . MobiWac, стр. 9-18. ACM, (2018)