Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting False Messages in the Smartphone Fault Reporting System., , , , , , and . IRICT, volume 1073 of Advances in Intelligent Systems and Computing, page 759-768. Springer, (2019)A Systematic Review of Radio Frequency Threats in IoMT., , , and . J. Sens. Actuator Networks, 11 (4): 62 (2022)Analysis of Applying Enterprise Service Bus Architecture as a Cloud Interoperability and Resource Sharing Platform., , and . KMO, volume 172 of Advances in Intelligent Systems and Computing, page 581-588. Springer, (2012)Botnet evolution: Network traffic indicators., , , and . ISBAST, page 274-279. IEEE, (2014)Improving Accessibility for Mobility Impaired People in Smart City using Crowdsourcing., , , , , , and . CCC, page 47-55. IEEE, (2019)Data Anonymization According to the Combination of Attributes on Social Network Sites., , and . SSCC, volume 377 of Communications in Computer and Information Science, page 272-280. Springer, (2013)A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices., , , , , and . J. Comput. Networks Commun., (2019)An Unsupervised Approach for Content-Based Clustering of Emails Into Spam and Ham Through Multiangular Feature Formulation., , , and . IEEE Access, (2021)Improved Intrusion Detection System Using Fuzzy Logic for Detecting Anamoly and Misuse Type of Attacks., and . SoCPaR, page 212-217. IEEE Computer Society, (2009)Self-healing hybrid intrusion detection system: an ensemble machine learning approach., , , and . Discov. Artif. Intell., 4 (1): 28 (2024)