Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach for Optimizing Ensemble Intrusion Detection Systems., , , , , , , , , and . IEEE Access, (2021)Enhanced Technique for Secure Wireless Sensor Routing with Respect to Energy Conservation., , , , , and . FGIT, volume 6485 of Lecture Notes in Computer Science, page 376-382. Springer, (2010)CICIDS-2017 Dataset Feature Analysis With Information Gain for Anomaly Detection., , , , , and . IEEE Access, (2020)Research on Heteregeneous Data for Recognizing Threat., , and . ICSOFT (1), page 222-225. SciTePress, (2011)Intrinsic authentication of multimedia objects using biometric data manipulation., , , , and . Int. Arab J. Inf. Technol., 9 (4): 336-342 (2012)Penetration Testing and Network Auditing: Linux., , and . J. Inf. Process. Syst., 11 (1): 104-115 (2015)Real traffic-data based evaluation of vehicular traffic environment and state-of-the-art with future issues in location-centric data dissemination for VANETs., , , , and . Digit. Commun. Networks, 3 (3): 195-210 (2017)Improvement of attack detection performance on the internet of things with PSO-search and random forest., , , , , , and . J. Comput. Sci., (2022)