Author of the publication

Fog-Based Attack Detection Framework for Internet of Things Using Deep Learning.

, , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fog-Based Attack Detection Framework for Internet of Things Using Deep Learning., , and . IEEE Access, (2020)Secure Task Offloading in Blockchain-Enabled Mobile Edge Computing With Deep Reinforcement Learning., , , , and . IEEE Trans. Netw. Serv. Manag., 19 (4): 4872-4887 (December 2022)SPETS: Secure and Privacy-Preserving Energy Trading System in Microgrid., , , and . Sensors, 21 (23): 8121 (2021)Utilizing Low-Cost Linux Micro-Computer & Android Phone Solutions on Cube-Satellites., , , , , , and . CoRR, (2022)An efficient binary whale optimisation algorithm with optimum path forest for feature selection., , and . Int. J. Comput. Appl. Technol., 63 (1/2): 41-54 (2020)Agile Adoption Process Framework, and . CoRR, (2006)SchemaWalk: Schema Aware Random Walks for Heterogeneous Graph Embedding., , , and . WWW (Companion Volume), page 1157-1166. ACM, (2022)Simultaneous Multi-View Instance Detection With Learned Geometric Soft-Constraints., , and . ICCV, page 6558-6567. IEEE, (2019)Multi-View Instance Matching with Learned Geometric Soft-Constraints., , and . ISPRS Int. J. Geo Inf., 9 (11): 687 (2020)Value-Driven Agile Adoption: Improving An Organization's Software Development Approach., and . SoMeT, volume 182 of Frontiers in Artificial Intelligence and Applications, page 149-164. IOS Press, (2008)