Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Review of Recent Advances and Security Challenges in Emerging E-Enabled Aircraft Systems., , , , , and . IEEE Access, (2019)SYNGuard: Dynamic threshold-based SYN flood attack detection and mitigation in software-defined networks., , , and . IET Networks, 10 (2): 76-87 (2021)IoT-AI/Machine Learning Experimental Testbeds: The Missing Piece., , , , and . IEEE Internet Things Mag., 7 (1): 136-143 (January 2024)A Decentralized Cooperative Navigation Approach for Visual Homing Networks., , , and . CoRR, (2023)ScreenCoin: A Blockchain-Enabled Decentralized Ad Network., , , , and . COINS, page 1-6. IEEE, (2022)Assessing Blockchain Consensus in Robotics: A Visual Homing Approach., , and . UEMCON, page 577-583. IEEE, (2023)SDN Security Review: Threat Taxonomy, Implications, and Open Challenges., , , , , and . IEEE Access, (2022)ML Attack Models: Adversarial Attacks and Data Poisoning Attacks., , , and . CoRR, (2021)SFC Provisioning With Load Balancing Method in Multi-Tier Fog Networks., , , and . IEEE Netw. Lett., 4 (2): 82-86 (2022)Incremental Learning Implementations and Vision for Cyber Risk Detection in IoT., , , and . IEEE Internet Things Mag., 4 (3): 114-119 (2021)