Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy., , , , , and . Concurrency and Computation: Practice and Experience, (2017)Chemical reaction optimization: survey on variants., , and . Evolutionary Intelligence, 12 (3): 395-420 (2019)Machine Learning Approaches for Modeling Spammer Behavior., , and . AIRS, volume 6458 of Lecture Notes in Computer Science, page 251-260. Springer, (2010)A Novel Approach for the Security Remedial in a Cloud-based E-learning Network., , and . JNW, 9 (11): 2934-2942 (2014)Variable Block Carry Skip Logic using Reversible Gates, , , , and . CoRR, (2010)Uncertainty And Evolutionary Optimization: A Novel Approach., , and . CoRR, (2014)Wrapper/TAM Co-Optimization and constrained Test Scheduling for SOCs Using Rectangle Bin Packing, , , , and . CoRR, (2010)New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques, , , and . CoRR, (2010)A Data Mining Approach to Predict Prospective Business Sectors for Lending in Retail Banking Using Decision Tree., and . CoRR, (2015)Hybrids of support vector machine wrapper and filter based framework for malware detection., , , , , and . Future Generation Comp. Syst., (2016)