Author of the publication

Game-Theory-Based Active Defense for Intrusion Detection in Cyber-Physical Embedded Systems.

, , , , , and . ACM Trans. Embed. Comput. Syst., 16 (1): 18:1-18:21 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Time-Ordered Aggregation Model-Based Centrality Metric for Mobile Social Networks., , , , , and . IEEE Access, (2018)Towards an Effective Secret Key Generation Scheme for Imperfect Channel State Information., , , , , and . Trustcom/BigDataSE/ISPA, page 915-920. IEEE, (2016)Topology-Transparent Scheduling Based on Reinforcement Learning in Self-Organized Wireless Networks., , , , and . IEEE Access, (2018)Special issue on pervasive and ubiquitous solutions for cultural enrichment., , and . Personal and Ubiquitous Computing, 24 (1): 1-4 (2020)RSU-Empowered Resource Pooling for Task Scheduling in Vehicular Fog Computing., , , , and . IWCMC, page 1758-1763. IEEE, (2020)A survey on communication and data management issues in mobile sensor networks., , , , , and . Wirel. Commun. Mob. Comput., 14 (1): 19-36 (2014)Surfing the Internet-of-Things: Lightweight Access and Control ofWireless Sensor Networks Using Industrial Low Power Protocols., , and . EAI Endorsed Trans. Ind. Networks Intell. Syst., 1 (1): e2 (2014)Subtask Scheduling for Distributed Robots in Cloud Manufacturing., , , , , and . IEEE Syst. J., 11 (2): 941-950 (2017)A Review on Design and Implementation of Software-Defined WLANs., , , , and . IEEE Syst. J., 14 (2): 2601-2614 (2020)Performance Comparison of Cognitive Radio Sensor Networks for Industrial IoT With Different Deployment Patterns., , , , and . IEEE Syst. J., 11 (3): 1456-1466 (2017)