Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Scalable Mutual Authentication and Key Distribution Mechanism in a NEMO Environment., , and . ICCSA (1), volume 3480 of Lecture Notes in Computer Science, page 591-600. Springer, (2005)A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment., and . ICOIN, volume 3391 of Lecture Notes in Computer Science, page 843-852. Springer, (2005)Development of Cloud-Based UAV Monitoring and Management System., , and . Sensors, 16 (11): 1913 (2016)Degree-based link scheduling for collision avoidance in distributed wireless sensor networks., , , and . ICUIMC, page 116:1-116:6. ACM, (2014)SybilEye: Observer-Assisted Privacy-Preserving Sybil Attack Detection on Mobile Crowdsensing., and . Information, 11 (4): 198 (2020)A Delay-Aware Scheduling for Data Aggregation in Duty-Cycled Wireless Sensor Networks., , , and . MSN, page 254-261. IEEE Computer Society, (2013)Risk Prediction Models for Mortality using Nursing Records in Intensive Care Patients: A Systematic Review., , , and . AMIA, AMIA, (2022)MrFair: Misbehavior-resistant fair scheduling in wireless mesh networks., , and . Ad Hoc Networks, 10 (3): 299-316 (2012)Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network., , and . SEUS, volume 4761 of Lecture Notes in Computer Science, page 466-476. Springer, (2007)A Test Framework for Secure Distributed Spectrum Sensing in Cognitive Radio Networks., , and . ACIIDS (2), volume 6592 of Lecture Notes in Computer Science, page 382-391. Springer, (2011)