Author of the publication

Game Theory for Privacy-Preserving Cybersecurity Information Exchange Framework.

, and . CCNC, page 730-735. IEEE, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting Congestion Level in Wireless Networks Using an Integrated Approach of Supervised and Unsupervised Learning., , and . UEMCON, page 977-982. IEEE, (2018)Performance of Adaptive Beam Nulling in Multihop Ad-Hoc Networks under Jamming., , , and . HPCC/CSS/ICESS, page 1236-1241. IEEE, (2015)Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks., , and . ICC, page 1-5. IEEE, (2010)Human Society Inspired Dynamic Spectrum Access Networks: The Effect of Parochialism., , and . GLOBECOM, page 1-5. IEEE, (2011)Scheduling for end-to-end performance in multi-rate CDMA/HDR systems., , and . Phys. Commun., 1 (4): 277-287 (2008)Scalable and Robust Outlier Detector using Hierarchical Clustering and Long Short-Term Memory (LSTM) Neural Network for the Internet of Things., and . Internet Things, (2020)BloCyNfo-Share: Blockchain based Cybersecurity Information Sharing with Fine Grained Access Control., , and . CCWC, page 317-323. IEEE, (2020)Improving Quality of VoIP Streams over WiMax., , and . IEEE Trans. Computers, 57 (2): 145-156 (2008)A Game Theoretic Framework for Power Control in Wireless Sensor Networks., , and . IEEE Trans. Computers, 59 (2): 231-242 (2010)Implementation of interface agility for duplex dynamic spectrum access radio using USRP., and . MILCOM, page 762-767. IEEE, (2017)