Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Key Management and Multi-Layered Security Framework for SCADA Systems., , , and . IEEE Trans. Netw. Serv. Manag., 19 (1): 642-660 (2022)Energy-Efficient Algorithm for Robot-Assisted Sensor Deployment., , , and . CCECE, page 1-5. IEEE, (2021)Protecting Routing Data in WSNs with use of IOTA Tangle., , , and . FNC/MobiSPC/SEIT, volume 203 of Procedia Computer Science, page 197-204. Elsevier, (2022)Prognostic Physiology: Modeling Patient Severity in Intensive Care Units Using Radial Domain Folding., and . AMIA, AMIA, (2012)Dynamically mapping tasks with priorities and multiple deadlines in a heterogeneous environment., , , , , , , , , and . J. Parallel Distributed Comput., 67 (2): 154-169 (2007)Dynamic Mapping in a Heterogeneous Environment with Tasks Having Priorities and Multiple Deadlines., , , , , , , , , and 5 other author(s). IPDPS, page 98. IEEE Computer Society, (2003)Implementation of 5G Authentication and Key Agreement Protocol on Xbee Networks., , , , , and . COMSNETS, page 696-698. IEEE, (2020)Overcoming Choice Inertia through Social Interaction - An Agent-Based Study of Mobile Subscription Decision., , , and . Games, 13 (3): 47 (2022)Public Hospitals Performance Measurement through a Three-Staged Data Envelopment Analysis Approach: Evidence from an Emerging Economy., , , , and . Cybern. Syst., 54 (1): 1-26 (2023)Group Secret-Key Generation Using Algebraic Rings in Wireless Networks., , and . IEEE Trans. Veh. Technol., 70 (2): 1538-1553 (2021)