关注
Shaher Slehat
Shaher Slehat
Phd candidate
在 uts.edu.au 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Game-theory based cognitive radio policies for jamming and anti-jamming in the IoT
Z Chaczko, S Slehar, T Shnoudi
2018 12th International Symposium on Medical Information and Communication …, 2018
82018
Hymuds: A hybrid multimodal data acquisition system
A Kale, Z Chaczko, S Slehat
2015 Asia-Pacific Conference on Computer Aided System Engineering, 107-112, 2015
42015
Objective quality metrics in correlation with subjective quality metrics for steganography
R Wazirali, S Slehat, Z Chaczko, G Borowik, L Carrión
2015 Asia-Pacific Conference on Computer Aided System Engineering, 238-245, 2015
42015
Application of predictive analytics in telecommunications project management
Z Chaczko, SS Slehat, A Salmon
Journal of Networks 10 (10), 551, 2015
32015
A Dynamic Declarative Composition Scheme for Stream Data Services
Z Zhang, Z Yang, S Ali, M Asshad, SS Slehat
Mobile Information Systems 2021 (1), 2502083, 2021
22021
Investigation of security and spectrum management issues in cognitive radio aided by machine learning
SSM Slehat
22020
Securing teredo client from NAT holes vulnerability
SS Slehat, Z Chaczko, A Kale
2015 Asia-Pacific Conference on Computer Aided System Engineering, 366-369, 2015
22015
Improved Expectation-Maximization Algorithm for Unknown Reverberant Audio-Source Separation
S Slehat
Journal of Applied Data Sciences 3 (1), 44-54, 2022
2022
Mitigating Nat Holes Vulnerability in Teredo Clients.
SS Slehat, Z Chaczko
J. Networks 10 (9), 521-529, 2015
2015
系统目前无法执行此操作,请稍后再试。
文章 1–9