From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hybrid approach to intrusion detection in fog-based IoT environments., , , , и . Comput. Networks, (2020)IoT Energy Management for Smart Homes' Water Management System., , , и . J. Circuits Syst. Comput., 32 (13): 2350217:1-2350217:24 (сентября 2023)A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic., , и . Sensors, 23 (15): 6933 (августа 2023)Hybrid protocol for group key management and transparent cluster interconnection in a secure wireless sensor network., , , и . NOMS, стр. 603-606. IEEE, (2012)Defending Grids Against Intrusions., , , и . IWSOS/EuroNGI, том 4124 из Lecture Notes in Computer Science, стр. 248-250. Springer, (2006)Using Fuzzy Specifications to Manage QoS., и . LANOMS, стр. 269-280. UFMG, (2001)Distribution of Network Management Policies with Emphasis on Quality of Service., и . LANOMS, стр. 213-224. UFRGS, (2005)An Experimentation on CoAP Multi Factor Authentication Mechanism with Reputation for Internet of Things Constrained Devices and Low Power Wide Area Network., , , и . ICOIN, стр. 67-72. IEEE, (2023)Security Approaches for Cluster Interconnection in a Wireless Sensor Network., и . APNOMS, том 4238 из Lecture Notes in Computer Science, стр. 542-545. Springer, (2006)Security management against cloned cellular telephones., , , и . ICON, стр. 356-363. IEEE, (1999)