Author of the publication

Design of a Machine Learning Based Intrusion Detection Framework and Methodology for IoT Networks.

, , , , and . CCWC, page 191-198. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Anomalous Behavior in Wireless Devices Using Changepoint Analysis., , , , and . ICIOT, page 82-90. IEEE, (2019)Experimental study of energy and bandwidth costs of web advertisements on smartphones., , , and . MobiCASE, page 90-97. IEEE, (2014)Towards Developing a Robust Intrusion Detection Model Using Hadoop-Spark and Data Augmentation for IoT Networks., , , , and . Sensors, 22 (20): 7726 (2022)Machine Learning Based Malware Detection in Wireless Devices Using Power Footprints., , , , , , and . ISSE, page 1-8. IEEE, (2019)Data Balancing and Hyper-parameter Optimization for Machine Learning Algorithms for Secure IoT Networks., , , and . Q2SWinet, page 71-78. ACM, (2022)Reflection on Software Architecture Practices - What Works, What Remains to Be Seen, and What Are the Gaps., , and . WICSA, page 221-222. IEEE Computer Society, (2005)Google Traces Analysis for Deep Machine Learning Cloud Elastic Model., , , and . SmartNets, page 1-6. IEEE, (2019)A price setting approach to power trading in cognitive radio networks., , , , and . ICUMT, page 878-883. IEEE, (2012)The impact of software evolution and reuse on software quality., , , and . Empirical Software Engineering, 1 (1): 31-44 (1996)A knowledge-base tool for testing VoIP gateway., , and . CCECE, page 1-4. IEEE, (2010)