Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MS-WMSN: service-oriented planning tool for wireless multimedia monitoring services., , and . Int. J. Inf. Commun. Technol., 8 (1): 50-68 (2016)AI-Based Autonomic and Scalable Security Management Architecture for Secure Network Slicing in B5G., , and . IEEE Netw., 36 (6): 165-174 (2022)Cybersecurity Fusion: Leveraging Mafia Game Tactics and Reinforcement Learning for Botnet Detection., , , , and . GLOBECOM, page 6005-6011. IEEE, (2023)Deep-Ensemble-Learning-Based GPS Spoofing Detection for Cellular-Connected UAVs., , , , and . IEEE Internet Things J., 9 (24): 25068-25085 (2022)Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G., , and . Comput. Networks, (2022)Energy-efficient coverage protocol based on stable and predictive scheduling in wireless sensor networks., , , and . Comput. Networks, (2017)A Deep Transfer Learning-Powered EDoS Detection Mechanism for 5G and Beyond Network Slicing., , , and . GLOBECOM, page 4747-4753. IEEE, (2023)Deep Learning for GPS Spoofing Detection in Cellular Enabled Unmanned Aerial Vehicle Systems., , , and . CoRR, (2022)Deep Learning for GPS Spoofing Detection in Cellular-Enabled UAV Systems., , , and . NaNA, page 501-506. IEEE, (2021)Accelerated Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks., , , and . CSE, page 633-639. IEEE Computer Society, (2012)