Author of the publication

Randomized Adaptive Routing Based on Mobile Agents.

, , , and . ISPAN, page 380-387. IEEE Computer Society, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Security Architecture for IoT Network., , and . ANT/SEIT, volume 52 of Procedia Computer Science, page 1028-1033. Elsevier, (2015)A self-adaptive structuring for large-scale P2P Grid environment: design and simulation analysis., , , and . Int. J. Grid Util. Comput., 8 (3): 254-267 (2017)Fully distributed and fault tolerant task management based on diffusions, , and . CoRR, (2008)Towards a Hierarchical Deep Learning Approach for Intrusion Detection., , , , and . MLN, volume 12081 of Lecture Notes in Computer Science, page 15-27. Springer, (2019)Original secure architecture for IoT based on SDN., , and . CFIP/NOTERE, page 1-6. IEEE, (2015)Self-adaptive structuring for P2P-based large-scale Grid environment Structuration auto-adaptative d'un système de grille pair-à-pair à large échelle., , , and . ARIMA J., (2016)Secure Exchanges Activity in Function of Event Detection with the SDN., , , , and . AFRICOMM, volume 275 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 315-324. Springer, (2018)Grid of Security: A New Approach of the Network Security., , , and . NSS, page 67-72. IEEE Computer Society, (2009)A Low Power LoRa-LoRaWan Relay Function with a Single Input, Single Output Device., , , and . EWSN, page 283-288. ACM, (2020)Comparison Between Different Types of Sensor Architecture Using a Uniform Relay Protocol., , , and . WINCOM, page 1-6. IEEE, (2020)