Author of the publication

A study on the channel bonding in IoT networks: Requirements, applications, and challenges.

, , , and . Int. J. Commun. Syst., (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modular approach for anomaly based NIDS., and . COMSWARE, page 1-6. IEEE, (2006)NTRU and Secret Sharing Based Secure Group Communication for IoT Applications., , , , and . IEEE Access, (2023)MATEM: A unified framework based on trust and MCDM for assuring security, reliability and QoS in DTN routing., , , and . J. Netw. Comput. Appl., (2018)Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization., , , and . Int. J. Mach. Learn. Cybern., 7 (6): 1035-1051 (2016)Evaluating the Effectiveness of Soft K-Means in Detecting Overlapping Clusters., , , , and . ICTCS, page 4:1-4:6. (2016)PGRDP: Reliability, Delay, and Power-Aware Area Minimization of Large-Scale VLSI Power Grid Network Using Cooperative Coevolution., , and . Intelligent Computing Paradigm, volume 784 of Studies in Computational Intelligence, Springer, (2020)Distributed Gateway Selection for Video Streaming in VANET Using IP Multicast., , and . ACM Trans. Multim. Comput. Commun. Appl., 18 (3): 81:1-81:24 (2022)Scalability of Correlation Clustering Through Constraint Reduction., , and . CODS, page 1-10. ACM, (2014)Consistent Coordination Decoupling in Tuple Space Based Mobile Middleware: Design and Formal Specifications., , and . ICDCIT, volume 7753 of Lecture Notes in Computer Science, page 220-231. Springer, (2013)ML for IEEE 802.15. 4e/TSCH: Energy Efficient Approach to Detect DDoS Attack Using Machine Learning., , and . IWCMC, page 1477-1482. IEEE, (2021)