Author of the publication

Security in cognitive wireless sensor networks. Challenges and open problems.

, , , and . EURASIP J. Wireless Comm. and Networking, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design, Implementation, and Case Study of a Pragmatic Vibrotactile Belt., , , , , and . IEEE Trans. Instrum. Meas., 60 (1): 114-125 (2011)Heartbeats: a methodology to convey interpersonal distance through touch., , , , and . CHI Extended Abstracts, page 3985-3990. ACM, (2010)Security in cognitive wireless sensor networks. Challenges and open problems., , , and . EURASIP J. Wireless Comm. and Networking, (2012)Using Self-Organizing Maps for Intelligent Camera-Based User Interfaces., , , , , , , , , and 1 other author(s). HAIS (2), volume 6077 of Lecture Notes in Computer Science, page 486-492. Springer, (2010)Monitoring of Ocimum basilicum seeds growth with image processing and fuzzy logic techniques based on Cloudino-IoT and FIWARE platforms., , , , and . Comput. Electron. Agric., (2020)Bio-inspired enhancement of reputation systems for intelligent environments., , , , , , , , , and 1 other author(s). Inf. Sci., (2013)Using clustering techniques for intelligent camera-based user interfaces., , , , , , , , , and 1 other author(s). Log. J. IGPL, 20 (3): 589-597 (2012)Detecting and Confining Sybil Attack in Wireless Sensor Networks Based on Reputation Systems Coupled with Self-organizing Maps., , , , , , , , , and . AIAI, volume 339 of IFIP Advances in Information and Communication Technology, page 311-318. Springer, (2010)SMORE: Towards a semantic modeling for knowledge representation on social media., , , and . Sci. Comput. Program., (2016)Cognitive Wireless Sensor Network Device for AAL Scenarios., , , , and . IWAAL, volume 6693 of Lecture Notes in Computer Science, page 116-121. Springer, (2011)