Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparative Analysis of Underwater Positioning and Navigation Systems., , and . UEMCON, page 763-767. IEEE, (2021)Implementing Variable Power Transmission Patterns for Authentication Purposes., , and . SAI (3), volume 1230 of Advances in Intelligent Systems and Computing, page 198-203. Springer, (2020)RSSI Measurements of Beacon Frames from Wi-Fi Radio Waves., and . (January 2023)Two Methods for Authentication Using Variable Transmission Power Patterns., and . CCWC, page 355-358. IEEE, (2020)Secure and Fraud Proof Online Payment System for Credit Cards., , and . UEMCON, page 264-268. IEEE, (2021)Securing IoT-Based Healthcare Systems Against Malicious and Benign Congestion., , , and . IEEE Internet Things J., 10 (14): 12975-12984 (July 2023)ML for Location Prediction Using RSSI On WiFi 2.4 GHZ Frequency Band., and . CoRR, (2022)Securing the Invisible Thread: A Comprehensive Analysis of BLE Tracker Security in Apple AirTags and Samsung SmartTags., , , and . CoRR, (2024)CI2FA: Continuous Indoor Two-factor Authentication Based On Trilateration System., , and . COMSNETS, page 1-5. IEEE, (2021)Zero-Effort Two-Factor Authentication Using Wi-Fi Radio Wave Transmission and Machine Learning., and . CCWC, page 313-318. IEEE, (2023)