Author of the publication

Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution.

, and . J. Supercomput., 74 (10): 4928-4944 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An accurate and efficient collaborative intrusion detection framework to secure vehicular networks., and . Comput. Electr. Eng., (2015)A2Ba: Adaptive Background Modelling for Visual Aerial Surveillance Conditions., , and . EAI Endorsed Trans. Ind. Networks Intell. Syst., 2 (4): e3 (2015)UAVs for traffic monitoring: A sequential game-based computation offloading/sharing approach., , , , and . Comput. Networks, (2020)Call Admission Control for Multimedia Cellular Networks Using Neuro-dynamic Programming., , and . NETWORKING, volume 2345 of Lecture Notes in Computer Science, page 1208-1213. Springer, (2002)A Reactive QoS Routing Protocol for Ad Hoc Networks., , , and . EUSAI, volume 2875 of Lecture Notes in Computer Science, page 27-41. Springer, (2003)Find a Meeting., , , , , , , and . EUSAI, volume 2875 of Lecture Notes in Computer Science, page 3-14. Springer, (2003)A Game Theory Based Efficient Computation Offloading in an UAV Network., , , and . IEEE Trans. Vehicular Technology, 68 (5): 4964-4974 (2019)A Cooperative Low Power Mac Protocol for Wireless Sensor Networks., , , and . ICC, page 1-6. IEEE, (2011)Game-Based Adaptive Risk Management in Wireless Body Area Networks., , , and . IWCMC, page 1087-1093. IEEE, (2018)A lightweight anomaly detection technique for low-resource IoT devices: A game-theoretic methodology., , and . ICC, page 1-6. IEEE, (2016)