Author of the publication

A hybrid machine learning model for intrusion detection in VANET.

, , and . Computing, 104 (3): 503-531 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile Cloud Middleware: Smart Behaviour for Adapting Cloud Services., and . SITIS, page 682-686. IEEE Computer Society, (2014)Survey on Trust in Software Engineering for Autonomous Dynamic Ecosystems., , , and . SAC, page 1490-1497. ACM, (2023)Deep-Learning based Reputation Model for Indirect Trust Management., , and . ANT/EDI40, volume 220 of Procedia Computer Science, page 405-412. Elsevier, (2023)Trust management in social Internet of Things across domains., , , and . Internet Things, (October 2023)Multi-Criteria Decision Analysis Methods in the Mobile Cloud Offloading Paradigm., , , , , and . J. Sens. Actuator Networks, 6 (4): 25 (2017)Big Data for Internet of Things: A Survey., , and . Future Gener. Comput. Syst., (2018)Blockchain Patterns in Critical Infrastructures: Limitations and Recommendations., and . ICSOFT, page 457-468. SCITEPRESS, (2022)A Research Roadmap of Big Data Clustering Algorithms for Future Internet of Things., , and . Int. J. Organ. Collect. Intell., 9 (2): 16-30 (2019)Quality Management for Big 3D Data Analytics: A Case Study of Protein Data Bank., , and . IoTBDS, page 286-293. SciTePress, (2019)Big Data Processing Tools Navigation Diagram., , , , and . IoTBDS, page 304-312. SCITEPRESS, (2020)