Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FaitH: Trusted Chain Network for Non-Cooperative D2D Communication Underlying HetNet., , , , , and . ECAI, page 1-6. IEEE, (2021)PoRF: Proof-of-Reputation-based Consensus Scheme for Fair Transaction Ordering., , , , , and . ECAI, page 1-6. IEEE, (2021)A Machine Learning Approach to Classify Network Traffic., , , , and . ECAI, page 1-6. IEEE, (2021)Considerations regarding security issues impact on systems availability., , , , and . CoRR, (2018)Formal reasoning on authentication in security protocols., , , and . SMC, page 282-289. IEEE, (2016)Radiation pattern synthesis using hybrid fourier-woodward-lawson-neural networks for reliable mimo antenna systems., , , , , and . SMC, page 3290-3295. IEEE, (2017)On the design of an interactive automatic Python programming skills assessment system., and . ECAI, page 1-5. IEEE, (2022)FPGA Implementation of SIMON-128 Cryptographic Algorithm Using Artix-7., , , , , and . CoRR, (2023)UAV identification system based on memristor physical unclonable functions., , , and . ECAI, page 1-4. IEEE, (2020)Method for authentication of sensors connected on Modbus TCP., , , , and . CoDIT, page 679-683. IEEE, (2017)