Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perceptual Audio Hashing Functions, , , and . EURASIP J. Appl. Signal Process., (January 2005)A Note on the Periodicity and the Output Rate of Bit Search Type Generators, , , and . CoRR, (2007)An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks., , , and . Expert Syst. Appl., 29 (4): 713-722 (2005)A DDoS attack detection and defense scheme using time-series analysis for SDN., , and . J. Inf. Secur. Appl., (2020)A DDoS attack detection and countermeasure scheme based on DWT and auto-encoder neural network for SDN., , and . Comput. Networks, (2022)Decision based directional edge detector., , and . Signal Process., 35 (2): 149-156 (1994)Location estimation using RSS measurements with unknown path loss exponents., , , , and . EURASIP J. Wirel. Commun. Netw., (2013)Homomorphic extensions of CRT-based secret sharing., , and . Discret. Appl. Math., (2020)A quadratic motion-based object-oriented video codec., , and . Signal Process. Image Commun., 15 (9): 729-766 (2000)A Novel Scheduling Strategy in Priority-Aware IoT Networks for Age of Information Optimization., , , and . IEEE Commun. Lett., 28 (2): 337-341 (February 2024)