Author of the publication

Perspectives on Cyber Science and Technology for Cyberization and Cyber-Enabled Worlds.

, , , , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 1-9. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cascade effects of load shedding in coupled networks., , and . ICON, page 1-6. IEEE, (2013)Compute-and-forward for two-way relay.. CSNDSP, page 465-468. IEEE, (2014)Weighted algebraic connectivity metric for non-uniform traffic in reliable network design., , and . ICUMT, page 1-6. IEEE, (2009)The multiple-key blom's scheme for key establishment in mobile ad hoc sensor networks., , and . APCC, page 427-432. IEEE, (2013)Lifetime-aware networks: It is not what you know but who you know., , , and . GlobalSIP, page 137-140. IEEE, (2015)A Framework for Ontology Evolution in Collaborative Environments., , , and . ISWC, volume 4273 of Lecture Notes in Computer Science, page 544-558. Springer, (2006)EntryBleed: A Universal KASLR Bypass against KPTI on Linux., , and . HASP@MICRO, page 10-18. ACM, (2023)A New Energy Efficient Big Data Dissemination Approach Using the Opportunistic D2D Communications., , and . SmartGIFT, volume 245 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 155-164. Springer, (2018)A User Profile-Aware Policy-Based Management Framework for Greening the Cloud., , and . BDCloud, page 682-687. IEEE Computer Society, (2014)Optimal pricing strategy for 5G in rural areas with unmanned aerial vehicles and large cells., , , and . ITNAC, page 1-7. IEEE Computer Society, (2017)