Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multihypothesis Sequential Testing for Illegitimate Access and Collision-Based Attack Detection in Wireless IoT Networks., , and . IEEE Internet Things J., 8 (14): 11705-11716 (2021)A Survey of Energy and Spectrum Harvesting Technologies and Protocols for Next Generation Wireless Networks., , , , and . IEEE Access, (2021)PLAKE: PUF-Based Secure Lightweight Authentication and Key Exchange Protocol for IoT., , , , , and . IEEE Internet Things J., 10 (10): 8547-8559 (May 2023)Two-Factor Authentication for IoT With Location Information., , and . IEEE Internet Things J., 6 (2): 3335-3351 (2019)Mutual Authentication in IoT Systems Using Physical Unclonable Functions., , and . IEEE Internet Things J., 4 (5): 1327-1340 (2017)Scaling of Spatial Reuse and Saturation Throughput in a Class of MAC Protocols., , and . IEEE Trans. Wirel. Commun., 6 (10): 3529-3533 (2007)An Analytical Approach to the Design of Energy Harvesting Wireless Sensor Nodes., , and . IEEE Trans. Wirel. Commun., 12 (8): 4010-4024 (2013)Guest Editorial: Security and Privacy in 5G-Enabled Industrial IoT Current Progress and Future Challenges., , and . IEEE Trans. Ind. Informatics, 19 (1): 867-869 (2023)Classification and Detection of PMU Data Manipulation Attacks Using Transmission Line Parameters., , and . IEEE Trans. Smart Grid, 9 (5): 5057-5066 (2018)Unified Detection of Attacks Involving Injection of False Control Commands and Measurements in Transmission Systems of Smart Grids., and . IEEE Trans. Smart Grid, 13 (2): 1598-1610 (2022)