Author of the publication

Context aware spectrum handoff scheme in cognitive radio vehicular networks.

, , and . IJAHUC, 24 (1/2): 101-116 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LEXER: LEXicon Based Emotion AnalyzeR., , and . PReMI, volume 10597 of Lecture Notes in Computer Science, page 373-379. Springer, (2017)Selection of cutting-fluids using a novel decision-making method: preference selection index method., , , and . IJIDS, 6 (4): 393-410 (2014)A Multi-objective Genetic Algorithm Based Approach for Effective Intrusion Detection Using Neural Networks., and . Intelligent Methods for Cyber Warfare, volume 563 of Studies in Computational Intelligence, Springer, (2015)Literature Survey on Power Control Algorithms for Mobile Ad-hoc Network., and . Wireless Personal Communications, 60 (4): 679-685 (2011)D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events., , and . J. Network and Computer Applications, (2018)AI based supervised classifiers: an analysis for intrusion detection., and . ACAI, page 170-174. ACM, (2011)Towards an Open-Source NFV Management and Orchestration Framework., , and . COMSNETS, page 251-255. IEEE, (2022)EVS-DK: Event video skimming using deep keyframe.. J. Visual Communication and Image Representation, (2019)Test case prioritization based on requirements and risk factors., , and . ACM SIGSOFT Software Engineering Notes, (2008)An information theoretic approach for feature selection., and . Security and Communication Networks, 5 (2): 178-185 (2012)