Author of the publication

Design of a Machine Learning Based Intrusion Detection Framework and Methodology for IoT Networks.

, , , , and . CCWC, page 191-198. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A CPU-based algorithm for traffic optimization based on sparse convolutional neural networks., , , , and . CCECE, page 1-5. IEEE, (2017)Scalable Update Propagation in Partially Replicated, Disconnected Client Server Databases., , and . ICEIS (1), page 11-21. (2006)Generation of Adaptive Test Cases from Nondeterministic Finite State Models., and . Protocol Test Systems, volume C-11 of IFIP Transactions, page 309-320. North-Holland, (1992)MultiDroid: An Energy Optimization Technique for Multi-Window Operations on OLED Smartphones., , , and . IEEE Access, (2018)Peer to peer content sharing on ad hoc networks of smartphones., , and . IWCMC, page 1445-1450. IEEE, (2011)Analysis of packet interference and aggregated throughput in a cluster of Bluetooth piconets under different traffic conditions., , , and . IEEE J. Sel. Areas Commun., 23 (6): 1205-1218 (2005)Efficient Algorithms For Selection And Sorting Of Large Distributed Files On De Bruijn And Hypercube Structures., , , and . Int. J. Found. Comput. Sci., 14 (6): 1129-1146 (2003)Detection of anomalous behavior of smartphones using signal processing and machine learning techniques., , , , , , and . PIMRC, page 1-7. IEEE, (2017)Software Implementation Strategies for Power-Conscious Systems., and . Mob. Networks Appl., 6 (3): 291-305 (2001)Skipping technique in face routing for wireless ad hoc and sensor networks., and . Int. J. Sens. Networks, 4 (1/2): 92-103 (2008)