Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collaboration in serious game development: a case study., and . Future Play, page 49-56. ACM, (2008)A Cost-effective Smart Farming System with Knowledge Base., , , , , , and . SoICT, page 309-316. ACM, (2017)DASSR: A Distributed Authentication Scheme for Secure Routing in Wireless Ad-hoc Networks., and . FDSE, volume 10018 of Lecture Notes in Computer Science, page 219-236. (2016)An Effective Approach to Background Traffic Detection.. FDSE, volume 9446 of Lecture Notes in Computer Science, page 135-146. Springer, (2015)Dynamic Resource Provisioning on Fog Landscapes., and . Secur. Commun. Networks, (2019)An effective flow aggregation for SDN-based background and foreground traffic control., , , , and . CCNC, page 1-4. IEEE, (2018)On-site configuration of disaster recovery access networks made easy., , , and . Ad Hoc Networks, (2016)Distributed Data Platform for Machine Learning Using the Fog Computing Model., , , , , and . SN Comput. Sci., 1 (3): 164 (2020)A User-Oriented Approach and Tool for Security and Privacy Protection on the Web., , , , and . SN Comput. Sci., 1 (4): 222 (2020)On-the-fly establishment of multihop wireless access networks for disaster recovery., , , and . IEEE Commun. Mag., 52 (10): 60-66 (2014)