Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using NFTs for Product Management, Digital Certification, Trading, and Delivery in the Healthcare Supply Chain., , , , , and . IEEE Trans. Engineering Management, (2024)Trust management in social Internet of vehicles: Factors, challenges, blockchain, and fog solutions., , , and . Int. J. Distributed Sens. Networks, (2019)Performance analysis of content discovery for ad-hoc tactile networks., , , , , and . Future Gener. Comput. Syst., (2019)Scalable blockchains - A systematic review., , , , , and . Future Gener. Comput. Syst., (2022)ASIC Implementation of Energy-Optimized Successive Cancellation Polar Decoders for Internet of Things., , , , , and . ICM, page 260-263. IEEE, (2018)A Novel TSV-Based power harvesting system for low-power applications.. ICM, page 178-181. IEEE, (2015)Multi-Agent pattern recognition mechanism for detecting distributed denial of service attacks., and . IET Inf. Secur., 4 (4): 333-343 (2010)An Analytical Model for Estimating Cloud Resources of Elastic Services., , and . J. Netw. Syst. Manag., 24 (2): 285-308 (2016)Performance analysis of multi-core VMs hosting cloud SaaS applications., and . Comput. Stand. Interfaces, (2018)A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT., , , , , and . CoRR, (2018)