Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel intrusion detection framework for Wireless Sensor Networks., , and . IAS, page 350-353. IEEE, (2011)Feature extraction process: A phishing detection approach., , and . ISDA, page 331-335. IEEE, (2013)Security Threats and Challenges to IoT and its Applications: A Review., , , and . FMEC, page 301-305. IEEE, (2020)An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications., , and . Appl. Soft Comput., 13 (4): 1978-1996 (2013)Analysis of Metaheuristics Feature Selection Algorithm for Classification., , and . HIS, volume 1375 of Advances in Intelligent Systems and Computing, page 214-222. Springer, (2020)Malay Word Stemmer to Stem Standard and Slang Word Patterns on Social Media., , , and . DMBD, volume 9714 of Lecture Notes in Computer Science, page 391-400. Springer, (2016)Application of Knowledge-oriented Convolutional Neural Network For Causal Relation Extraction In South China Sea Conflict Issues., , , and . CRC, page 1-7. IEEE, (2021)Mobility pattern based misbehavior detection in vehicular adhoc networks to enhance safety., , and . ICCVE, page 894-901. IEEE, (2014)A Review on Challenging Issues in Arabic Sentiment Analysis., , and . J. Comput. Sci., 12 (9): 471-481 (2016)An Adaptive Intrusion Detection Scheme for Cloud Computing., and . Int. J. Swarm Intell. Res., 10 (4): 53-70 (2019)