Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Domain Specific Code Smells in Smart Contracts., , , , , and . CoRR, (2019)Automated Deobfuscation of Android Native Binary Code., , , , and . CoRR, (2019)Transfer of Learning from Metaverse to Blockchain for Secondary Students: Implementation and Effectiveness Evaluation., , , , , and . ACE, page 154-163. ACM, (2024)Dynamic Virtual Resource Allocation Mechanism for Survivable Services in Emerging NFV-Enabled Vehicular Networks., , , , and . IEEE Trans. Intell. Transp. Syst., 23 (11): 22492-22504 (2022)Editorial for special issue on "security and privacy protection in the era of IoT devices"., , , , , and . Digit. Commun. Networks, 7 (2): 245-246 (2021)Modeling User Browsing Activity for Application Layer DDoS Attack Detection., , , and . SecureComm, volume 198 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 747-750. Springer, (2016)Toward Tailored Resource Allocation of Slices in 6G Networks With Softwarization and Virtualization., , , , , , and . IEEE Internet Things J., 9 (9): 6623-6637 (2022)Resource-Ability Assisted Service Function Chain Embedding and Scheduling for 6G Networks With Virtualization., , , , , , and . IEEE Trans. Veh. Technol., 70 (4): 3846-3859 (2021)Resource Allocation of E2E Slices in Softwarized UAVs-Assisted 6G Terrestrial Networks., , , , , and . WCSP, page 610-614. IEEE, (2022)An Evolutionary Study of IoT Malware., , , , , , , , , and 2 other author(s). IEEE Internet Things J., 8 (20): 15422-15440 (2021)