Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures., , , , and . SP (Workshops), page 126. IEEE, (2020)On exploiting cognitive radio to mitigate interference in macro/femto heterogeneous networks., , , and . IEEE Wirel. Commun., 18 (3): 40-47 (2011)An Empirical Evaluation of Bluetooth-based Decentralized Contact Tracing in Crowds., , , , , , , , and . CoRR, (2020)Analysis of Information Delivery Dynamics in Cognitive Sensor Networks Using Epidemic Models., , and . IEEE Internet of Things Journal, 5 (4): 2333-2342 (2018)Traffic-aware Patching for Cyber Security in Mobile IoT., , , and . CoRR, (2017)Firmulti Fuzzer: Discovering Multi-process Vulnerabilities in IoT Devices with Full System Emulation and VMI., and . CPSIOTSEC@CCS, page 1-9. ACM, (2023)Phase Transition Diagram for Underlay Heterogeneous Cognitive Radio Networks., , and . GLOBECOM, page 1-6. IEEE, (2010)Beamforming and Power Allocation in Dynamic TDD Networks Supporting Machine-Type Communication., , , and . ICC, page 1-6. IEEE, (2020)Secure location tracking of femtocells in heterogeneous cellular networks., , and . DSC, page 267-272. IEEE, (2017)Demo: An Emulator-Based Active Protection System Against IoT Malware., and . IEEE Symposium on Security and Privacy Workshops, page 162. IEEE, (2019)