Author of the publication

Using Machine Learning to Estimate the Optimal Transmission Range for RPL Networks.

, , , and . NOMS, page 1-5. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Reconciling Safety and Security Risk Analysis Processes in Railway Remote Driving., , , and . ICSRS, page 148-154. IEEE, (2021)Self-Stabilizing Protocol for Shortest Path Tree for Multi-cast Routing in Mobile Networks (Research Note)., , and . Euro-Par, volume 1900 of Lecture Notes in Computer Science, page 600-604. Springer, (2000)Key Pre-Distributions From Graph-Based Block Designs., , and . CoRR, (2015)Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments., , and . J. Ambient Intell. Humaniz. Comput., 9 (5): 1527-1539 (2018)A Memory-efficient Group Key Managment for Communicating Things., , and . Q2SWinet, page 29-35. ACM, (2020)A Distributed token/based Algorithm for the Dynamic Resource Allocation Problem., and . ACM SIGOPS Oper. Syst. Rev., 34 (3): 60-68 (2000)A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things., , , and . J. Netw. Comput. Appl., (2020)Machine Learning-Based Communication Collision Prediction and Avoidance for Mobile Networks., , and . AINA (1), volume 449 of Lecture Notes in Networks and Systems, page 194-204. Springer, (2022)Single-Path Network Coding Authentication for Software-Defined Named Data Networking., , and . AICCSA, page 1-8. IEEE Computer Society, (2019)Slotted contention-based energy-efficient MAC protocols in delay-sensitive wireless sensor networks., , , and . ISCC, page 419-422. IEEE Computer Society, (2012)