Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Privacy-preserving Data Collection and Processing Framework for Third-party UAV Services., , , and . TrustCom, page 683-690. IEEE, (2020)RESONATE: Advancing Sustainability in IoT Networks through Smart and Selective Data Streaming., , , and . CIC, page 35-41. IEEE, (2023)Secure Broadcast Protocol for Unmanned Aerial Vehicle Swarms., , , , and . ICCCN, page 1-9. IEEE, (2020)Elastic multicast for tactical communications., , , , , and . MILCOM, page 1-6. IEEE, (2012)The SMesh wireless mesh network., , , and . ACM Trans. Comput. Syst., 28 (3): 6:1-6:49 (2010)Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 7 (1): 80-93 (2010)Adaptive routing for tactical communications., , , , , , and . MILCOM, page 1-7. IEEE, (2012)Process optimization system used in metallurgical plants., and . SMC, page 3989-3992. IEEE, (1998)Reliable Communication in Overlay Networks., and . DSN, page 511-520. IEEE Computer Society, (2003)A Reinforcement Learning Approach to Adaptive Redundancy for Routing in Tactical Networks., , and . MILCOM, page 267-272. IEEE, (2018)