Author of the publication

Modeling cyber rumor spreading over mobile social networks: A compartment approach.

, , , , and . Applied Mathematics and Computation, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stability of neural networks with delay and variable-time impulses., , , , , and . Neurocomputing, (2016)CLETer: A Character-level Evasion Technique Against Deep Learning DGA Classifiers., , , and . EAI Endorsed Trans. Security Safety, 7 (24): e5 (2021)Modeling cyber rumor spreading over mobile social networks: A compartment approach., , , , and . Applied Mathematics and Computation, (2019)On Security Analysis of Generic Dynamic Authenticated Group Key Exchange., , , and . NordSec, volume 11252 of Lecture Notes in Computer Science, page 121-137. Springer, (2018)Modeling Ransomware Spreading by a Dynamic Node-Level Method.. IEEE Access, (2019)Stability of switched neural networks with time-varying delays., , , , and . Neural Computing and Applications, 30 (7): 2229-2244 (2018)Part-metric and its applications in discrete systems., , , and . Applied Mathematics and Computation, (2014)On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks., , , , and . IJDSN, (2018)Dynamics of a family of two-dimensional difference systems., , and . Applied Mathematics and Computation, 219 (11): 5949-5955 (2013)An epidemic model of computer viruses with vaccination and generalized nonlinear incidence rate., , , , and . Applied Mathematics and Computation, (2013)