Author of the publication

Feature Selection-Based Detection of Covert Cyber Deception Assaults in Smart Grid Communications Networks Using Machine Learning.

, , , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimized and Portable FPGA-Based Systolic Cell Architecture for Smith-Waterman-Based DNA Sequence Alignment., , and . J. Inform. and Commun. Convergence Engineering, (2016)Modeling and Analysis of DIPPM: A New Modulation Scheme for Visible Light Communications., , and . J. Sensors, (2015)Efficient Selection of Users' Pair in Cognitive Radio Network to Maximize Throughput Using Simultaneous Transmit-Sense Approach., , , and . IEICE Transactions, 100-B (2): 380-389 (2017)An Efficient Weight-Based Cooperative Spectrum Sensing Scheme in Cognitive Radio Systems., and . IEICE Transactions, 93-B (8): 2191-2194 (2010)Performance Analysis of Random Access Channel in OFDMA Systems., , and . Systems Communications, page 128-133. IEEE Computer Society, (2005)Belief Propagation-Based Cognitive Routing in Maritime Ad Hoc Networks., , and . IJDSN, 12 (4): 7635206:1-7635206:10 (2016)Opportunistic relaying based spectrum leasing for cognitive radio networks., , and . Journal of Communications and Networks, 13 (1): 50-55 (2011)A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks., , , , and . Wireless Communications and Mobile Computing, (2019)Energy-Efficient Infrastructure Sensor Network for Ad Hoc Cognitive Radio Network., , and . CoRR, (2015)A Secure Distributed Spectrum Sensing Scheme in Cognitive Radio., and . ICIC (2), volume 5755 of Lecture Notes in Computer Science, page 698-707. Springer, (2009)