Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain., , , , , and . Internet Things, (December 2023)An Agriprecision Decision Support System for Weed Management in Pastures., , , , and . IEEE Access, (2023)A blockchain-based framework for automatic SLA management in fog computing environments., , , , , and . J. Supercomput., 78 (15): 16647-16677 (2022)Leveraging Oversampling Techniques in Machine Learning Models for Multi-class Malware Detection in Smart Home Applications., , , , , , and . TrustCom, page 2216-2221. IEEE, (2023)Multiple linear regression-based energy-aware resource allocation in the Fog computing environment., , , , and . Comput. Networks, (2022)DQN Approach for Adaptive Self-Healing of VNFs in Cloud-Native Network., , , , , and . IEEE Access, (2024)Defending SDN against packet injection attacks using deep learning., , , , , , and . CoRR, (2023)Efficient Prefetching and Client-Side Caching Algorithms for Improving the Performance of Read Operations in Distributed File Systems., , and . IEEE Access, (2022)Information Fusion-based Cybersecurity Threat Detection for Intelligent Transportation System., , , , , and . CCGridW, page 96-103. IEEE, (2023)Defending SDN against packet injection attacks using deep learning., , , , , , and . Comput. Networks, (October 2023)