Author of the publication

A Cooperative Wireless Sensor Network for Indoor Industrial Monitoring.

, , and . IEEE Trans. Ind. Informatics, 13 (2): 482-491 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An alternative use of the NetLogo modeling environment, where the student thinks and acts like an Agent, in order to teach concepts of Ecology., , , , and . CoRR, (2015)Spectral Fingerprinting on a Standard Mobile Phone., and . J. Sensors, (2010)Automatic incident detection in smart city using multiple traffic flow parameters via V2X communication., and . IJDSN, (2018)Locating and Disregarding the Information from Compromised Sensors in a WSN., , and . UEMCON, page 609-613. IEEE, (2018)Sensor Cooperation and Decision Fusion to Improve Detection in Cognitive Radio Spectrum Sensing., , , and . UEMCON, page 276-281. IEEE, (2018)Dominant Factors in the Network Domain That Influence the QoE of an IPTV Service., , , and . EMS, page 629-634. IEEE, (2013)Cellular automata trust-based energy drainage attack detection and prevention in Wireless Sensor Networks., , , , and . Comput. Commun., (2022)Circumventing Google Play vetting policies: a stealthy cyberattack that uses incremental updates to breach privacy., , , , and . J. Ambient Intell. Humaniz. Comput., 14 (5): 4785-4794 (2023)Security Assessment and Evaluation of VPNs: A Comprehensive Survey., , , , , , , , , and . ACM Comput. Surv., 55 (13s): 273:1-273:47 (2023)Quality education from the student's perspective: a qualitative study on two HEIs of Karachi., , and . Int. J. Knowl. Learn., 16 (4): 354-373 (2023)