Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Controlling the degradation of Wireless Sensor Networks., , , and . IWCMC, page 1217-1223. IEEE, (2015)Wireless Measurement System for Structural Health Monitoring With High Time-Synchronization Accuracy., , , , , , and . IEEE Trans. Instrumentation and Measurement, 61 (3): 801-810 (2012)A Security Scheme for Wireless Sensor Networks., , , , and . GLOBECOM, page 1-5. IEEE, (2016)Improving security in WMNs with reputation systems and self-organizing maps., , , , , , , , , and 1 other author(s). J. Netw. Comput. Appl., 34 (2): 455-463 (2011)Cognitive test-bed for wireless sensor networks., , , , , and . DySPAN, page 346-349. IEEE, (2014)New MRI, 18F-DOPA and 11C-(+)-α-dihydrotetrabenazine templates for Macaca fascicularis neuroimaging: Advantages to improve PET quantification., , , , , , , , , and 4 other author(s). NeuroImage, 47 (2): 533-539 (2009)Using Self-Organizing Maps for Intelligent Camera-Based User Interfaces., , , , , , , , , and 1 other author(s). HAIS (2), volume 6077 of Lecture Notes in Computer Science, page 486-492. Springer, (2010)PUE Attack Detection in CWSN Using Collaboration and Learning Behavior., , , , and . IJDSN, (2013)A Game Theory Based Strategy for Reducing Energy Consumption in Cognitive WSN., , , and . IJDSN, (2014)Security in cognitive wireless sensor networks. Challenges and open problems., , , and . EURASIP J. Wireless Comm. and Networking, (2012)