Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of AV systems against modern malware., , , and . ICITST, page 269-273. IEEE, (2017)Special issue on "Modeling and simulation techniques for future generation communication networks"., , and . Simul. Model. Pract. Theory, 18 (4): 405-406 (2010)Modeling of initial contention window size for successful initial ranging process in IEEE 802.22 WRAN cell., , , and . Simul. Model. Pract. Theory, (2015)Modeling and analysis of customer premise equipments registration process in IEEE 802.22 WRAN cell., , , and . J. Syst. Softw., (2014)Advances in modelling and evaluation of communication systems., , and . Telecommun. Syst., 38 (3-4): 69-70 (2008)Modeling and online parameter estimation of intake manifold in gasoline engines using sliding mode observer., , , , and . Simul. Model. Pract. Theory, (2013)Guest Editorial., , and . Clust. Comput., 10 (1): 1-2 (2007)CloudIntell: An intelligent malware detection system., , and . Future Gener. Comput. Syst., (2018)Analysis of adversary activities using cloud-based web services to enhance cyber threat intelligence., , and . Serv. Oriented Comput. Appl., 14 (3): 175-187 (2020)Towards QoS in Internet of Things for Delay Sensitive Information., and . MobiWIS (Workshops), volume 183 of Communications in Computer and Information Science, page 86-94. Springer, (2013)