Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The President's Page., and . IEEE Communications Magazine, 56 (11): 4-5 (2018)Performance Assessment of Signaling Protocols in Optical Burst Switching Mesh Networks., and . ICOIN, volume 3090 of Lecture Notes in Computer Science, page 750-759. Springer, (2004)Detecting mobile botnets through machine learning and system calls analysis., , , , and . ICC, page 1-6. IEEE, (2017)A utility based access point selection method for IEEE 802.11 wireless networks with enhanced quality of experience., , and . ICC, page 2363-2368. IEEE, (2014)Anomaly detection using DSNS and Firefly Harmonic Clustering Algorithm., , , , and . ICC, page 1183-1187. IEEE, (2012)An Efficient Blockchain-Based Hierarchical Authentication Mechanism for Energy Trading in V2G Environment., , , , and . ICC Workshops, page 1-6. IEEE, (2019)A hybrid system to stimulate selfish nodes to cooperate in vehicular Delay-Tolerant Networks., , , and . ICC, page 5910-5915. IEEE, (2015)Predicting hypertensive disorders in high-risk pregnancy using the random forest approach., , , , and . ICC, page 1-5. IEEE, (2017)Co-channel interference modelling between RATs in heterogeneous wireless networks., , and . ICC, page 5321-5325. IEEE, (2012)A mobile healthcare solution for ambient assisted living environments., , , , and . Healthcom, page 170-175. IEEE, (2014)