Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Preserving Multi-Party Key Exchange Protocol for Wireless Mesh Networks., , , , and . Sensors, 22 (5): 1958 (2022)Plant and Salamander Inspired Network Attack Detection and Data Recovery Model., , , , and . Sensors, 23 (12): 5562 (2023)Incremental Approach for Detecting Arbitrary and Embedded Cluster Structures., , and . MEDI, volume 9893 of Lecture Notes in Computer Science, page 220-233. Springer, (2016)ma-CODE: A multi-phase approach on community detection in evolving networks., , and . Inf. Sci., (2021)A Parallel Approach to Detect Communities in Evolving Networks., and . BDA, volume 11297 of Lecture Notes in Computer Science, page 188-203. Springer, (2018)Detecting intrinsic communities in evolving networks., and . Soc. Netw. Anal. Min., 9 (1): 13:1-13:15 (2019)What Comes after Web 3.0? Web 4.0 and the Future, and . (2015)Evaluating the Effectiveness of Soft K-Means in Detecting Overlapping Clusters., , , , and . ICTCS, page 4:1-4:6. (2016)Pre-Processing: A Data Preparation Step., , , , and . Encyclopedia of Bioinformatics and Computational Biology (1), Elsevier, (2019)Uncovering hidden community structures in evolving networks based on neighborhood similarity., , , , , and . J. Intell. Fuzzy Syst., 39 (6): 8315-8324 (2020)