Author of the publication

Advances and challenges of wireless body area networks for healthcare applications.

, , , and . ICNC, page 99-103. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DeepFeat: A Bottom-Up and Top-Down Saliency Model Based on Deep Features of Convolutional Neural Networks., , and . IEEE Trans. Cogn. Dev. Syst., 12 (1): 54-63 (2020)Advances and challenges of wireless body area networks for healthcare applications., , , and . ICNC, page 99-103. IEEE Computer Society, (2012)Using network traffic to infer power levels in wireless sensor nodes., , and . ICNC, page 864-870. IEEE, (2014)On Optimal Slot Allocation for Reservation TDMA MAC Protocol in Shadow Fading Environment., , , and . ISWCS, page 809-813. IEEE, (2007)Wireless Body Area Networks for Healthcare: A Survey, , , and . International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), 3 (3): 26 (June 2012)New Security Approach for ZigBee Weaknesses., , and . EUSPN/ICTH, volume 37 of Procedia Computer Science, page 376-381. Elsevier, (2014)ReMot Reputation and Resource-Based Model to Estimate the Reliability of the Host Machines in Volunteer Cloud Environment., , , and . FiCloud, page 63-70. IEEE Computer Society, (2018)Using network traffic to infer compromised neighbors in wireless sensor nodes., , , , , , and . CCNC, page 1022-1023. IEEE, (2017)SaRa: A Stochastic Model to Estimate Reliability of Edge Resources in Volunteer Cloud., , and . EDGE, page 121-124. IEEE Computer Society, (2018)Implementing IPsec in Wireless Sensor Networks., and . NTMS, page 1-5. IEEE, (2014)