Game-theory based cognitive radio policies for jamming and anti-jamming in the IoT Z Chaczko, S Slehar, T Shnoudi 2018 12th International Symposium on Medical Information and Communication …, 2018 | 8 | 2018 |
Hymuds: A hybrid multimodal data acquisition system A Kale, Z Chaczko, S Slehat 2015 Asia-Pacific Conference on Computer Aided System Engineering, 107-112, 2015 | 4 | 2015 |
Objective quality metrics in correlation with subjective quality metrics for steganography R Wazirali, S Slehat, Z Chaczko, G Borowik, L Carrión 2015 Asia-Pacific Conference on Computer Aided System Engineering, 238-245, 2015 | 4 | 2015 |
Application of predictive analytics in telecommunications project management Z Chaczko, SS Slehat, A Salmon Journal of Networks 10 (10), 551, 2015 | 3 | 2015 |
A Dynamic Declarative Composition Scheme for Stream Data Services Z Zhang, Z Yang, S Ali, M Asshad, SS Slehat Mobile Information Systems 2021 (1), 2502083, 2021 | 2 | 2021 |
Investigation of security and spectrum management issues in cognitive radio aided by machine learning SSM Slehat | 2 | 2020 |
Securing teredo client from NAT holes vulnerability SS Slehat, Z Chaczko, A Kale 2015 Asia-Pacific Conference on Computer Aided System Engineering, 366-369, 2015 | 2 | 2015 |
Improved Expectation-Maximization Algorithm for Unknown Reverberant Audio-Source Separation S Slehat Journal of Applied Data Sciences 3 (1), 44-54, 2022 | | 2022 |
Mitigating Nat Holes Vulnerability in Teredo Clients. SS Slehat, Z Chaczko J. Networks 10 (9), 521-529, 2015 | | 2015 |