Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stability of neural networks with delay and variable-time impulses., , , , , and . Neurocomputing, (2016)CLETer: A Character-level Evasion Technique Against Deep Learning DGA Classifiers., , , and . EAI Endorsed Trans. Security Safety, 7 (24): e5 (2021)Modeling cyber rumor spreading over mobile social networks: A compartment approach., , , , and . Applied Mathematics and Computation, (2019)Modeling Ransomware Spreading by a Dynamic Node-Level Method.. IEEE Access, (2019)On Security Analysis of Generic Dynamic Authenticated Group Key Exchange., , , and . NordSec, volume 11252 of Lecture Notes in Computer Science, page 121-137. Springer, (2018)Stability of switched neural networks with time-varying delays., , , , and . Neural Computing and Applications, 30 (7): 2229-2244 (2018)On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks., , , , and . IJDSN, (2018)Part-metric and its applications in discrete systems., , , and . Applied Mathematics and Computation, (2014)Dynamics of a family of two-dimensional difference systems., , and . Applied Mathematics and Computation, 219 (11): 5949-5955 (2013)Synchronization of Chaotic Systems with Time Delays via Periodically Intermittent Control., , , , and . Journal of Circuits, Systems, and Computers, 26 (9): 1750139:1-1750139:20 (2017)