Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Duality on timing alignment and radio resources orthogonality toward 5G heterogeneous networks., , and . VITAE, page 1-5. IEEE, (2014)On exploiting SDN to facilitate IPv4/IPv6 coexistence and transition., , , and . DSC, page 473-474. IEEE, (2017)Retransmission-Based Access Class Barring for Machine Type Communications., , and . IoTaaS, volume 246 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 145-154. Springer, (2017)IoT Malware Detection Using Function-Call-Graph Embedding., , , , and . PST, page 1-9. IEEE, (2021)Ecology-Based DoS Attack in Cognitive Radio Networks., and . IEEE Symposium on Security and Privacy Workshops, page 104-110. IEEE Computer Society, (2016)Energy-Efficient BLE Device Discovery for Internet of Things., , and . CANDAR, page 75-79. IEEE Computer Society, (2017)Analysis of Information Delivery Dynamics in Cognitive Sensor Networks Using Epidemic Models., , and . IEEE Internet of Things Journal, 5 (4): 2333-2342 (2018)Traffic-aware Patching for Cyber Security in Mobile IoT., , , and . CoRR, (2017)Firmulti Fuzzer: Discovering Multi-process Vulnerabilities in IoT Devices with Full System Emulation and VMI., and . CPSIOTSEC@CCS, page 1-9. ACM, (2023)ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures., , , , and . SP (Workshops), page 126. IEEE, (2020)