Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Resource Provisioning on Fog Landscapes., and . Secur. Commun. Networks, (2019)A User-Oriented Approach and Tool for Security and Privacy Protection on the Web., , , , and . SN Comput. Sci., 1 (4): 222 (2020)Distributed Data Platform for Machine Learning Using the Fog Computing Model., , , , , and . SN Comput. Sci., 1 (3): 164 (2020)On-the-fly establishment of multihop wireless access networks for disaster recovery., , , and . IEEE Commun. Mag., 52 (10): 60-66 (2014)Reliable Deep Learning and IoT-Based Monitoring System for Secure Computer Numerical Control Machines Against Cyber-Attacks With Experimental Verification., , , , , , , and . IEEE Access, (2022)Synergistic approaches to mobile intelligent transportation systems considering low penetration rate., , and . Pervasive Mob. Comput., (2014)An effective flow aggregation for SDN-based background and foreground traffic control., , , , and . CCNC, page 1-4. IEEE, (2018)On-site configuration of disaster recovery access networks made easy., , , and . Ad Hoc Networks, (2016)An Effective Approach to Background Traffic Detection.. FDSE, volume 9446 of Lecture Notes in Computer Science, page 135-146. Springer, (2015)Collaboration in serious game development: a case study., and . Future Play, page 49-56. ACM, (2008)