Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information., , and . Expert Syst. Appl., 42 (21): 7560-7572 (2015)UAV IoT Framework Views and Challenges: Towards Protecting Drones as "Things"., , , and . Sensors, 18 (11): 4015 (2018)Analysing indirect Sybil attacks in randomly deployed Wireless Sensor Networks., , and . PIMRC, page 1-6. IEEE, (2016)Network Protocols, Schemes, and Mechanisms for Internet of Things (IoT): Features, Open Challenges, and Trends., , and . Wirel. Commun. Mob. Comput., (2018)An analytical framework of a C-RAN supporting random, quasi-random and bursty traffic., , , , and . Comput. Networks, (2020)SDN-Based Resilient Smart Grid: The SDN-microSENSE Architecture., , , , , , , , , and 23 other author(s). Digit., 1 (4): 173-187 (December 2021)The effect of group mobility on the efficacy of routing in next generation mobile networks., , and . ICT, page 1-5. IEEE, (2016)Resource Allocation Combining Heuristic Matching and Particle Swarm Optimization Approaches: The Case of Downlink Non-Orthogonal Multiple Access., and . Information, 10 (11): 336 (2019)A Reinforcement learning-based cognitive MAC protocol., , , , and . ICC, page 5608-5613. IEEE, (2015)VisIoT: A threat visualisation tool for IoT systems security., , and . ICC Workshops, page 2633-2638. IEEE, (2015)