Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Advanced security testing using a cyber-attack forecasting model: A case study of financial institutions., , , , , and . J. Softw. Evol. Process., (2022)Adaptive Duty Cycle (ADC) energy efficient algorithm for ZigBee networks., , , , and . Comput. Syst. Sci. Eng., (2017)Inspired Counter Based Broadcasting for Dynamic Source Routing in Mobile Networks., and . CIT/IUCC/DASC/PICom, page 1455-1459. IEEE, (2015)Improvement on LEACH Protocol of Wireless Sensor Network (VLEACH)., , , and . JDCTA, 3 (2): 132-136 (2009)Intelligent Randomize Round Robin for Cloud Computing., , and . IJCAC, 3 (1): 27-33 (2013)Enhanced Home Energy Management Scheme (EHEM) in Smart Grids.. Int. J. Commun. Networks Inf. Secur., (2018)A resource intensive traffic-aware scheme using energy-aware routing in cognitive radio networks., , , , , and . Future Gener. Comput. Syst., (2014)A new probabilistic broadcasting scheme for mobile ad hoc on-demand distance vector (AODV) routed networks., , and . J. Supercomput., 53 (1): 196-211 (2010)A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things., , , and . CIT/IUCC/DASC/PICom, page 1118-1122. IEEE, (2015)Network Size Estimation in VANETs., , , and . Netw. Protoc. Algorithms, 5 (3): 136-152 (2013)