Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing the Topological Structure of the eBay Negotiations' Network., , and . WebMedia, page 131-138. ACM, (2014)THOR: A framework to build an advanced metering infrastructure resilient to DAP failures in smart grids., , , and . Future Gener. Comput. Syst., (2019)A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack., , , and . Secur. Commun. Networks, (2018)Poster: Understanding Human Mobility during COVID-19 using Cellular Network Traffic., , , , , , and . Networking, page 1-3. IEEE, (2021)Transparent mobility or devices on the Internet using OpenFlow., , , and . ICDIM, page 155-160. IEEE, (2017)S4Q: Searching for QoE in P2P streaming neighborhoods., , , , and . ICDIM, page 167-172. IEEE, (2016)Pros & cons of model-based bandwidth control for client-assisted content delivery., , and . COMSNETS, page 1-8. IEEE, (2014)Calculating the trust of providers through the construction weighted Sec-SLA., , , and . Future Gener. Comput. Syst., (2019)On the detection of selfish mining and stalker attacks in blockchain networks., , , and . Ann. des Télécommunications, 75 (3-4): 143-152 (2020)Poster: COVID-19 Case Prediction using Cellular Network Traffic., , , , and . Networking, page 1-3. IEEE, (2021)