Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IoT-Based Surveillance Camera Distribution Using Triangle Geometry., , , and . CoDIT, page 2193-2198. IEEE, (2023)A Novel and Efficient Priority-Based Cross-Layer Contextual Unobservability Scheme Against Global Attacks for WMSNs., , , , and . Int. J. Interact. Mob. Technol., 15 (3): 43-69 (2021)Machine Learning-Driven Optimization for Intrusion Detection in Smart Vehicular Networks., , , , and . Wirel. Pers. Commun., 117 (4): 3129-3152 (2021)Probabilistic analysis of security attacks in cloud environment using hidden Markov models., , , and . Trans. Emerg. Telecommun. Technol., (2022)Wireless Multimedia Sensor Networks: Current Trends and Future Directions., , , and . Sensors, 10 (7): 6662-6717 (2010)A Secure Cluster-Based Multipath Routing Protocol for WMSNs., , and . Sensors, 11 (4): 4401-4424 (2011)Wireless multimedia sensor networks, security and key management.. Polytechnic University of Catalonia, Spain, (2013)A resource sharing platform for resource-constrained software defined cognitive radio networks., , , , and . SDS, page 32-39. IEEE, (2018)An Efficient Location Privacy Scheme for Wireless Multimedia Sensor Networks., , , and . ETFA, page 1615-1618. IEEE, (2019)A lightweight and efficient digital image encryption using hybrid chaotic systems for wireless network applications., , , , and . J. Inf. Secur. Appl., (2019)