Your selections:
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder, Islam, Syed
Churn prediction in telecom industry using machine learning ensembles with class balancing
- Chowdhury, Abdullahi, Kaisar, Shahriar, Rashid, Md Mamunur, Shafin, Sakib, Kamruzzaman, Joarder
Detection of android malware using tree-based ensemble stacking model
- Shafin, Sakib, Ahmed, Md Maroof, Pranto, Mahmud, Chowdhury, Abdullahi
Priority based and secured traffic management system for emergency vehicle using IoT
Using e-learning to engage unemployed rural women in aquaculture in Bangladesh to reduce poverty
- Rupok, Quazi, Chowdhury, Abdullahi
Detecting intrusion in the traffic signals of an intelligent traffic system
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder, Saha, Tapash
- Nath, Subrata, Islam, Mohammad, Chowdhury, Abdullahi, Rashid, Mohammad, Islam, Maheen, Jabid, Taskeed, Naha, Ranesh
Distributed denial of service attack detection using machine learning and class oversampling
- Shafin, Sakib, Prottoy, Shafin, Abbas, Saif, Hakim, Safayat, Chowdhury, Abdullahi, Rashid, Md Mamanur
A smart priority-based traffic control system for emergency vehicles
- Karmakar, Gour, Chowdhury, Abdullahi, Kamruzzaman, Joarder, Gondal, Iqbal
Cyber attacks in mechatronics systems based on Internet of Things
Survey of recent cyber security attacks on robotic systems and their mitigation approaches
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder
Enhancing service quality and reliability in intelligent traffic system
Recent cyber security attacks and their mitigation approaches - An overview
Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain
- Edris, Ed, Aiash, Mahdi, Khoshkholghi, Mohammad, Naha, Ranesh, Chowdhury, Abdullahi, Loo, Jonathan
Trusted autonomous vehicle : measuring trust using on-board unit data
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder
Attacks on self-driving cars and their countermeasures : a survey
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder, Jolfaei, Alireza, Das, Rajkumar
An evidence theoretic approach for traffic signal intrusion detection
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder, Das, Rajkumar, Newaz, Shah
Assessing trust level of a driverless car using deep learning
- Karmakar, Gour, Chowdhury, Abdullahi, Das, Rajkumar, Kamruzzaman, Joarder, Islam, Syed
The co-evolution of cloud and IoT applications : recent and future trends
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder
IoT-based emergency vehicle services in intelligent transportation system
- Chowdhury, Abdullahi, Kaisar, Shahriar, Khoda, Mahbub, Naha, Ranesh, Khoshkholghi, Mohammad, Aiash, Mahdi
Are you sure you would like to clear your session, including search history and login status?