Author of the publication

Design of a Machine Learning Based Intrusion Detection Framework and Methodology for IoT Networks.

, , , , and . CCWC, page 191-198. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Environmental impact on optimization analysis for standalone and hybrid power generating units., , , , and . CCECE, page 994-998. IEEE, (2011)A Quantum-Based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networks., , , and . Symmetry, 14 (8): 1625 (2022)Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model With Majority Vote Ensemble Algorithm., , , and . IEEE Trans. Netw. Sci. Eng., 8 (3): 2559-2574 (2021)FedChallenger: Challenge-Response-Based Defence for Federated Learning Against Byzantine Attacks., , , , , and . GLOBECOM, page 3843-3848. IEEE, (2023)Analytical Modeling and Prediction of Cloud Workload., , , and . ICC Workshops, page 1-6. IEEE, (2021)Reusing and converting code clones to aspects - An algorithmic approach., , , and . IRI, page 9-16. IEEE, (2012)Comparison of Spectrum Management without Game Theory (SMWG) and with Game Theory (SMG) for Network Performance in Cognitive Radio Network., , , , and . BWCCA, page 348-355. IEEE, (2012)Exposing resources as Web services: A performance oriented approach., , , , and . SPECTS, page 1-10. IEEE, (2012)A game theoretic approach to power trading in cognitive radio systems., , , , and . SoftCOM, page 1-5. IEEE, (2012)A Framework for Automatic Resource Provisioning for Private Clouds., , , , , , and . CCGRID, page 610-617. IEEE Computer Society, (2013)