Author of the publication

Cybersecurity Fusion: Leveraging Mafia Game Tactics and Reinforcement Learning for Botnet Detection.

, , , , and . GLOBECOM, page 6005-6011. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reinforcement Learning-Based Slice Isolation Against DDoS Attacks in Beyond 5G Networks., , , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 3930-3946 (September 2023)Encryption as a Service: A Review of Architectures and Taxonomies., , and . DAIS, volume 14677 of Lecture Notes in Computer Science, page 36-44. Springer, (2024)Cybersecurity Fusion: Leveraging Mafia Game Tactics and Reinforcement Learning for Botnet Detection., , , , and . GLOBECOM, page 6005-6011. IEEE, (2023)CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities., , , , , and . Microprocess. Microsystems, (April 2022)DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments., , , and . Clust. Comput., 26 (1): 367-384 (February 2023)Privacy-Aware and AI Techniques for Healthcare Based on K-Anonymity Model in Internet of Things., , , , and . IEEE Trans. Engineering Management, (2024)Enhancing 5G Network Slicing: Slice Isolation Via Actor-Critic Reinforcement Learning with Optimal Graph Features., , , and . GLOBECOM, page 31-37. IEEE, (2023)Encryption as a Service for IoT: Opportunities, Challenges, and Solutions., , , , , and . IEEE Internet Things J., 11 (5): 7525-7558 (2024)A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things., , , , , and . Clust. Comput., 26 (1): 599-612 (February 2023)Setting up SLAs using a dynamic pricing model and behavior analytics in business and marketing strategies in cloud computing., , , , and . Pers. Ubiquitous Comput., 27 (6): 2225-2241 (December 2023)