Author of the publication

Two-Levels Verification for Secure Data Aggregation in Resource-Constrained Environments.

, , and . ICC, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incentive edge caching in software-defined internet of vehicles: A Stackelberg game approach., , , and . Int. J. Commun. Syst., (2019)An efficient cyber defense framework for UAV-Edge computing network., , , and . Ad Hoc Networks, (2019)A new intrusion detection approach against lethal attacks in the smart grid: temporal and spatial based detections., , , and . GIIS, page 1-3. IEEE, (2015)Cyber Security Framework for Vehicular Network Based on a Hierarchical Game., , , and . IEEE Trans. Emerg. Top. Comput., 9 (1): 429-440 (2021)Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology., , and . IEEE Trans. Intell. Transp. Syst., 18 (5): 1143-1153 (2017)Attacks detection and decision framework based on generative adversarial network approach: Case of vehicular edge computing network.. Trans. Emerg. Telecommun. Technol., (2022)Design and Implementation of an Algorithm for Cardiac Pathologies Detection on Mobile Phone., , and . Int. J. Wirel. Inf. Networks, 18 (1): 11-23 (2011)Software-Defined heterogeneous vehicular networks: Taxonomy and architecture., , , , and . GIIS, page 50-55. IEEE, (2017)Zero Trust Architecture Empowered Attack Detection Framework to Secure 6G Edge Computing., and . IEEE Netw., 38 (1): 196-202 (January 2024)An efficient intrusion detection framework in cluster-based wireless sensor networks., , and . Secur. Commun. Networks, 6 (10): 1211-1224 (2013)