Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IO-MAC: An Enhancement of IEEE 802.11 DCF Using Implicit Ordering., , and . Wireless Personal Communications, 72 (2): 1467-1473 (2013)Dynamics of Modeling in Data Mining: Interpretive Approach to Bankruptcy Prediction., , and . J. Manag. Inf. Syst., 16 (1): 63-86 (1999)An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks., , , , and . Peer-to-Peer Netw. Appl., 8 (4): 684-693 (2015)Converting the Point of View of Message Spoken to Virtual Assistants., , , , , and . EMNLP (Findings), volume EMNLP 2020 of Findings of ACL, page 154-163. Association for Computational Linguistics, (2020)Effective Web-Related Resource Security Using Distributed Role Hierarchy., , , and . WAIM, volume 3129 of Lecture Notes in Computer Science, page 87-96. Springer, (2004)Lightweight IEC 61850 Secure Communication Module for Microgrids., , and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 443-451. Springer, (2016)Centralized Contention Based MAC for OFDMA WLAN., and . IEICE Trans. Inf. Syst., 100-D (9): 2219-2223 (2017)Aberration Estimation for Synthetic Aperture Digital Holographic Microscope Using Deep Neural Network., , , and . Sensors, 23 (22): 9278 (November 2023)RPS: An Extension of Reference Monitor to Prevent Race-Attacks., , , and . PCM (1), volume 3331 of Lecture Notes in Computer Science, page 556-563. Springer, (2004)An Effective Method for Location Privacy in Ubiquitous Computing., , and . EUC Workshops, volume 3823 of Lecture Notes in Computer Science, page 1006-1015. Springer, (2005)