Author of the publication

Android Malware Identification Based on Traffic Analysis.

, , and . ICAIS (1), volume 11632 of Lecture Notes in Computer Science, page 293-303. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the throughput-energy tradeoff for data transmission between cloud and mobile devices., , , , , and . Inf. Sci., (2014)VMPlanner: Optimizing virtual machine placement and traffic flow routing to reduce network power costs in cloud data centers., , , , and . Computer Networks, 57 (1): 179-196 (2013)Optimising data placement and traffic routing for energy saving in Backbone Networks., , , , and . Trans. Emerging Telecommunications Technologies, 25 (9): 914-925 (2014)A Novel Scheme for High Performance Finite-Difference Time-Domain (FDTD) Computations Based on GPU., , , , and . ICA3PP (1), volume 6081 of Lecture Notes in Computer Science, page 441-453. Springer, (2010)Software-defined cellular networking: a practical path towards 5G., , , , and . IJCNDS, 14 (1): 89-105 (2015)Preserving Private Knowledge In Decision Tree Learning., , and . JCP, 5 (5): 733-740 (2010)Comment on `Robust Cooperative Routing Protocol in Mobile Wireless Sensor Networks'.. IEEE Trans. Wireless Communications, 12 (8): 4222-4223 (2013)A Stochastic Control Approach to Maximize Profit on Service Provisioning for Mobile Cloudlet Platforms., , , , and . IEEE Trans. Systems, Man, and Cybernetics: Systems, 48 (4): 522-534 (2018)Link-Aware Geographic Routing in Wireless Sensor Networks., , , and . CSE (2), page 937-942. IEEE Computer Society, (2009)Numerical simulation of Swift-Hohenberg equation by the fourth-order compact scheme., , , and . Comput. Appl. Math., (2019)