Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Management and Fast Handovers in Software Defined Wireless Networks Using UAVs., , , and . IEEE Netw., 31 (6): 78-85 (2017)SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers., , , and . Mob. Inf. Syst., (2017)Collaborative Cache Allocation and Transmission Scheduling for Multi-User in Edge Computing., , and . IEEE Access, (2020)Cyber Threats to Industrial Control Systems., , , , and . MIST@CCS, page 79-81. ACM, (2015)Towards Intelligent Attack Detection Using DNA Computing., , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 19 (3s): 126:1-126:27 (2023)Editorial., , and . Comput. Syst. Sci. Eng., (2012)A pipeline-based approach for long transaction processing in web service environments., , , , , and . IJWGS, 7 (2): 190-207 (2011)A Security Protocol for Route Optimization in DMM-Based Smart Home IoT Networks., , , , , and . IEEE Access, (2019)SGF-MD: Behavior Rule Specification-Based Distributed Misbehavior Detection of Embedded IoT Devices in a Closed-Loop Smart Greenhouse Farming System., , , and . IEEE Access, (2020)Can Multipath TCP be Robust to Cyber Attacks With Incomplete Information?, , , , , and . IEEE Access, (2020)