Author of the publication

Machine learning-assisted signature and heuristic-based detection of malwares in Android devices.

, , , , , , , , and . Comput. Electr. Eng., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance comparison of end-to-end mobility management protocols for TCP., , , and . J. Netw. Comput. Appl., 35 (6): 1657-1673 (2012)Fuzzy Logic-based Efficient Interest Forwarding (FLEIF) in Named Data Networking., , , , , , , and . Trans. Emerg. Telecommun. Technol., (2019)A Route Optimized Distributed IP-Based Mobility Management Protocol for Seamless Handoff across Wireless Mesh Networks., , , , , , , and . Mob. Networks Appl., 23 (4): 752-774 (2018)Machine learning-assisted signature and heuristic-based detection of malwares in Android devices., , , , , , , , and . Comput. Electr. Eng., (2018)A QoS approach for cluster-based routing in VANETS using TDMA scheme., , , and . ICTC, page 212-217. IEEE, (2013)Clustering algorithm for internet of vehicles (IoV) based on dragonfly optimizer (CAVDO)., , , , , and . J. Supercomput., 74 (9): 4542-4567 (2018)Grey wolf optimization based clustering algorithm for vehicular ad-hoc networks., , , , , , , , , and . Comput. Electr. Eng., (2018)A dynamic caching strategy for CCN-based MANETs., , , , , , and . Comput. Networks, (2018)Application of Fog and Cloud Computing for Patient's Data in the Internet of Things., and . EIDWT, volume 29 of Lecture Notes on Data Engineering and Communications Technologies, page 425-436. Springer, (2019)An analysis of service disruption time for TCP applications using end-to-end mobility management protocols., , , and . MoMM, page 360-364. ACM, (2009)