Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RONFC: A Novel Enabler-Independent NFC Protocol for Mobile Transactions., , and . IEEE Access, (2019)A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks., , , , , and . J. Netw. Comput. Appl., (2014)Real-time Mobile-Cloud Computing for Context- Aware Blind Navigation.. IJNGC, (2011)Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks., , , , , and . SRDS Workshop, page 57-61. IEEE Computer Society, (2015)Machine Learning Models to Enhance the Science of Cognitive Autonomy., , , , , and . AIKE, page 46-53. IEEE Computer Society, (2018)Adaptable Safety and Security in V2X Systems., , and . ICIOT, page 17-24. IEEE Computer Society, (2017)An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing., , , , , , and . SRDS, page 177-183. IEEE Computer Society, (2010)An End-to-End Security Auditing Approach for Service Oriented Architectures., , , , , , , and . SRDS, page 279-284. IEEE Computer Society, (2012)A Computational Dynamic Trust Model for User Authorization., , , and . IEEE Trans. Dependable Secur. Comput., 12 (1): 1-15 (2015)I see EK: A lightweight technique to reveal exploit kit family by overall URL patterns of infection chains., , and . Turkish J. Electr. Eng. Comput. Sci., 27 (5): 3713-3728 (2019)