Author of the publication

Redefining E-Commerce Experience: An Exploration of Augmented and Virtual Reality Technologies.

, , , , , , and . Int. J. Semantic Web Inf. Syst., 19 (1): 1-24 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols., , , , , , , and . Int. J. Cloud Appl. Comput., 13 (1): 1-26 (2023)Machine Learning-Driven Optimization for Intrusion Detection in Smart Vehicular Networks., , , , and . Wirel. Pers. Commun., 117 (4): 3129-3152 (2021)Energy-Efficiency Routing algorithms in Wireless Sensor Networks: a Survey., , , and . CoRR, (2020)Evasion Generative Adversarial Network for Low Data Regimes., , , and . IEEE Trans. Artif. Intell., 4 (5): 1076-1088 (October 2023)Botnets Detecting Attack Based on DNS Features., , , , and . ACIT, page 1-4. IEEE, (2018)Security Hardening of Botnet Detectors Using Generative Adversarial Networks., , , , and . IEEE Access, (2021)EVAGAN: Evasion Generative Adversarial Network for Low Data Regimes., , , , and . CoRR, (2021)Mlora-CBF: efficient cluster-based routing protocol against resource allocation using modified location routing algorithm with cluster-based flooding., , , , , , and . Wirel. Networks, 30 (2): 671-693 (February 2024)Ensembling validation indices to estimate the optimal number of clusters., , , , and . Appl. Intell., 53 (9): 9933-9957 (May 2023)Feature Selection Using a Machine Learning to Classify a Malware., , , and . Handbook of Computer Networks and Cyber Security, Springer, (2020)