Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

E-ProbT: a new approach to mitigate the broadcast storm problem in VANETs., , , and . SAC, page 709-715. ACM, (2016)A method using time series analysis for IEEE 802.11 WLANs channel forecasting., , , , , , and . EATIS, page 21. (2007)MBEEC: A bio-inspired routing protocol with multihop between cluster-heads for energy saving in WSN., , , , , and . IWCMC, page 349-354. IEEE, (2015)Empirical evaluation of the link and content-based focused Treasure-Crawler., , and . Comput. Stand. Interfaces, (2016)Heimdall: Blockchain-Based Consent Management Framework., , , and . ICOIN, page 487-492. IEEE, (2023)Taxonomy and Proposed Architecture of Intrusion Detection and Prevention Systems for Cloud Computing., , , and . CSS, volume 7672 of Lecture Notes in Computer Science, page 441-458. Springer, (2012)SACM: Stateful Access Control Model a More Detailed Approach., , , , , and . CSE, page 317-324. IEEE Computer Society, (2013)A systematic technical survey of DTN and VDTN routing protocols., , , and . Comput. Stand. Interfaces, (2016)Safety Measures for Social Computing in Wiki Learning Environment., , , , and . Int. J. Inf. Secur. Priv., 6 (2): 1-15 (2012)Assessing Measurements of QoS for Global Cloud Computing Services., , , , , and . DASC, page 682-689. IEEE Computer Society, (2011)