Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Continuous User Authentication Based on Deep Neural Networks., , and . UCET, page 1-4. IEEE, (2020)On demand-based frequency allocation to mitigate interference in Femto-Macro LTE cellular network., , , and . FGCT, page 213-218. IEEE, (2013)Implementing Fingerprint Recognition on One-Time Password Device to Enhance User Authentication., , and . CSS (2), volume 11983 of Lecture Notes in Computer Science, page 448-461. Springer, (2019)Security analysis of the constrained application protocol in the Internet of Things., , and . FGCT, page 163-168. IEEE, (2013)Intrusion Detection and Classification with Autoencoded Deep Neural Network., , , and . SecITC, volume 11359 of Lecture Notes in Computer Science, page 142-156. Springer, (2018)Mobile femtocell utilisation in LTE vehicular environment: Vehicular penetration loss elimination and performance enhancement., , , , and . Veh. Commun., (2017)Using aggregated RSVP in nested HMIPv6., , and . IWCMC, page 716-721. IEEE, (2012)Recognising the Activities of Low Entropy Mobile People Using Wireless Proximity Data., , , , and . ITNG, page 109-114. IEEE Computer Society, (2012)Evaluation of Energy Consumption and Delay in Different Modes of Data Aggregation for Wireless Sensor Networks., , , , , , , and . UCET, page 1-4. IEEE, (2020)An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks., , , , and . CISS, page 1-6. IEEE, (2019)