Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graph Neural Network Operators: a Review., , and . Multim. Tools Appl., 83 (8): 23413-23436 (2024)Graph Neural Network based Handwritten Trajectories Recognition., , and . CoRR, (2024)Pathloss Study for 61 GHZ Wave D2D Communications in Indoor Environment., , , , , and . Wirel. Pers. Commun., 97 (1): 387-395 (2017)An intelligent approach based on neuro-fuzzy detachment scheme for preventing jamming attack in wireless networks., , and . J. Intell. Fuzzy Syst., 28 (2): 809-820 (2015)Design of Intrusion Detection and Prevention in SCADA System for the Detection of Bias Injection Attacks., and . Secur. Commun. Networks, (2019)A two-step trace model for the detection of UVI attacks against power grids in the wireless network., and . Soft Comput., 25 (7): 5199-5207 (2021)Optimal feature selection in intrusion detection using SVM-CA., and . Int. J. Netw. Virtual Organisations, 25 (2): 103-113 (2021)CLUEBOX: A Performance Log Analyzer for Automated Troubleshooting., , , , and . WASL, USENIX Association, (2008)Detection of data integrity attacks by constructing an effective intrusion detection system., and . J. Ambient Intell. Humaniz. Comput., 11 (11): 5233-5244 (2020)Scrutiny of unruly and abuse in wireless networks to mitigate physical layer threats using discriminate based misbehavior prevention., and . Clust. Comput., 19 (1): 87-97 (2016)