Author of the publication

Physical layer security in wireless cooperative relay networks: state of the art and beyond.

, , , , , and . IEEE Communications Magazine, 53 (12): 32-39 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Game Theoretic Cloud-Assisted Opportunistic Spectrum Access in Cognitive Radio Networks., and . Int. J. Grid High Perform. Comput., 8 (2): 94-110 (2016)AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment., , , , , and . IEEE Internet Things J., 6 (5): 8804-8817 (2019)Design and Testbed Experiments of User Authentication and Key Establishment Mechanism for Smart Healthcare Cyber Physical Systems., , , , and . IEEE Trans. Netw. Sci. Eng., 10 (5): 2697-2709 (September 2023)Cloud-assisted GPS-driven dynamic spectrum access in cognitive radio vehicular networks for transportation cyber physical systems., , , , and . WCNC, page 1942-1947. IEEE, (2015)Enhancing connectivity for spectrum-agile Vehicular Ad hoc NETworks in fading channels., and . Intelligent Vehicles Symposium, page 957-962. IEEE, (2014)Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs., , , , , and . ICC, page 1-7. IEEE, (2018)AISCM-FH: AI-Enabled Secure Communication Mechanism in Fog Computing-Based Healthcare., , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Data Provenance in the Cloud: A Blockchain-Based Approach., , , , and . IEEE Consumer Electron. Mag., 8 (4): 38-44 (2019)Simulation for cybersecurity: state of the art and future directions., , , , , and . J. Cybersecur., (2021)TDDEHT: Threat Detection Using Distributed Ensembles of Hoeffding Trees on Streaming Cyber Datasets., , , and . MILCOM, page 1-6. IEEE, (2018)