Author of the publication

Prediction of malicious objects using prey-predator model in Internet of Things (IoT) for smart cities.

, , , and . Comput. Ind. Eng., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of anomaly detection in surveillance video: recent trends and future vision., , , and . Multim. Tools Appl., 82 (8): 12635-12651 (March 2023)Prediction of malicious objects using prey-predator model in Internet of Things (IoT) for smart cities., , , and . Comput. Ind. Eng., (2022)Nature-Inspired Computational Model of Population Desegregation under Group Leaders Influence., , , and . CoRR, (2019)Prediction Market Index by Combining Financial Time-Series Forecasting and Sentiment Analysis Using Soft Computing., , and . DCAI, volume 800 of Advances in Intelligent Systems and Computing, page 180-187. Springer, (2018)A Simulation Model Demonstrating the Impact of Social Aspects on Social Internet of Things., , , , and . iiWAS, page 202-211. ACM, (2019)Integrating EduLearn learning content management system (LCMS) with cooperating learning object repositories (LORs) in a peer to peer (P2P) architectural framework., , and . ACM SIGSOFT Softw. Eng. Notes, 34 (3): 1-7 (2009)Enhanced inquiry method for malicious object identification., , and . ACM SIGSOFT Softw. Eng. Notes, 34 (3): 1-5 (2009)Efficient evacuation in a multi-exit environment: an agent-based decision support model., , and . IJIDS, 11 (4): 355-375 (2019)Testing polymorphism in object oriented systems for improving software quality.. ACM SIGSOFT Softw. Eng. Notes, 34 (2): 1-5 (2009)Dynamic Virtual Machine Allocation in Cloud Computing Using Elephant Herd Optimization Scheme., , and . J. Circuits Syst. Comput., 32 (11): 2350188:1-2350188:18 (July 2023)