Author of the publication

Computation offloading of a vehicle's continuous intrusion detection workload for energy efficiency and performance.

, , , , and . Simul. Model. Pract. Theory, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prototyping a Hyperledger Fabric-Based Security Architecture for IoMT-Based Health Monitoring Systems., , , , and . Future Internet, 15 (9): 308 (2023)NeuralPot: An Industrial Honeypot Implementation Based On Deep Neural Networks., , , , , , , and . ISCC, page 1-7. IEEE, (2020)Investigating the Tradeoffs between Power Consumption and Quality of Service in a Backbone Network., , and . Future Internet, 5 (2): 268-281 (2013)Admission Control in Self Aware Networks., , and . GLOBECOM, IEEE, (2006)Admission of QoS aware users in a smart network., , and . ACM Trans. Auton. Adapt. Syst., 3 (1): 4:1-4:28 (2008)Controlling Access to Preserve QoS in a Self-Aware Network., , and . SASO, page 205-213. IEEE Computer Society, (2007)Performance evaluation of the Cognitive Packet Network in the presence of network worms.. Perform. Evaluation, 68 (10): 927-937 (2011)Strengthening the security of cognitive packet networks., , and . Int. J. Adv. Intell. Paradigms, 6 (1): 14-27 (2014)Energy-Aware Admission Control for Wired Networks., , and . ISCIS, volume 264 of Lecture Notes in Electrical Engineering, page 117-125. Springer, (2013)The Cognitive Packet Network: A Survey.. Comput. J., 53 (3): 268-279 (2010)