Showing
1 - 3
results of
3
for search '
Mehbodniya, A.
'
Skip to content
Home
Collections
High Impact Articles
Jawi Collection
Malay Medicine
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Mehbodniya, A.
Showing
1 - 3
results of
3
for search '
Mehbodniya, A.
'
, query time: 0.16s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Active and Reactive Power Management in the Smart Distribution Network Enriched with Wind Turbines and Photovoltaic Systems
by
Azimian, M.
,
Masrur, H.
,
Mehbodniya
,
A
.
,
Paeizi, A.
,
Rezaie, M.
,
Senjyu, T.
Published 2022
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
Article
2
Towards Effective Evaluation of Cyber Defense: Threat Based Adversary Emulation Approach
by
Ajmal, A.B
,
Alam, M.
,
Khan, S.
,
Mehbodniya
,
A
.
,
Waheed, A.
,
Webber, J.
Published 2023
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
3
Addressing the Real World Problem of Managing Wireless Communication Systems Using Explainable AI-Based Models through Correlation Analysis
by
Alam, T.
,
Gupta, S.
,
Kaliyaperumal, K.
,
Kapula, P.R
,
Mehbodniya
,
A
.
,
Panduro-Ramirez, J.
,
Surya, S.
Published 2022
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
Article
Search Tools:
Get RSS Feed
—
Email this Search
Related Subjects
ATT&CK predictions
Artificial intelligence
Communications network system
Correlation analysis
Cyber Attack Simulations
Data link
Defense Evaluation
Efficient communications
Emulation
Endpoint Security Evaluation
Malware
Network variables
Node location
Organizations
Payloads
Penetration Testing
Penetration testing
Real-world problem
Security
Software-based method
Stealthy Attacks
Testing
Wireless communication system
Wireless communications
alternative energy
electricity generation
linear approximation
management practice
numerical model
power scheduling
Loading...