Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards feasibility of Deep-Learning based Intrusion Detection System for IoT Embedded Devices., , and . CCNC, page 947-948. IEEE, (2022)A Blockchain-based Trust Management Approach for Connected Autonomous Vehicles in Smart Cities., , , and . CCWC, page 544-549. IEEE, (2019)Cluster-Based Dynamic Backup in Cognitive Radio Networks., and . ICNC, page 740-744. IEEE Computer Society, (2017)Mitigating Eavesdropping Attack Using Secure Key Management Scheme in Wireless Mesh Networks., , and . J. Commun., 7 (8): 596-605 (2012)Physical Layer-Based IoT Security: An Investigation Into Improving Preamble-Based SEI Performance When Using Multiple Waveform Collections., , , , and . IEEE Access, (2022)Self-protecting networking using dynamic p-cycle construction within link capacity constraint., , , and . Secur. Commun. Networks, 5 (6): 689-708 (2012)Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks., , , and . Secur. Commun. Networks, 6 (4): 539-547 (2013)Pre-print: Radio Identity Verification-based IoT Security Using RF-DNA Fingerprints and SVM., , , , and . CoRR, (2020)B2-C2: Blockchain-based Flow Control Consistency for Multi-Controller SDN Architecture., and . ICCE, page 1-6. IEEE, (2024)Towards trusted and energy-efficient data collection in unattended wireless sensor networks., , and . Wirel. Networks, 26 (7): 5455-5471 (2020)