Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Agent-based Modeling and Simulation of Virus on a Scale-Free Network., , , and . ICFNDS, page 59:1-59:6. ACM, (2017)Bottom up Approach for Better Requirements Elicitation., , , , and . ICFNDS, page 60:1-60:4. ACM, (2017)Auto Configuration Based Enhanced and Secure Domain Naming Service for IPV-6 Internet of Things., , , , and . ICFNDS, page 58:1-58:5. ACM, (2017)Speeding Up the Internet of Things: LEAIoT: A Lightweight Encryption Algorithm Toward Low-Latency Communication for the Internet of Things., , , , and . IEEE Consumer Electronics Magazine, 7 (6): 31-37 (2018)FlowJustifier: An optimized trust-based request prioritization approach for mitigation of SDN controller DDoS attacks in the IoT paradigm., , , and . ICFNDS, page 43:1-43:9. ACM, (2019)A Review of Internet of Things (IoT) Connectivity Techniques., , , and . Recent Trends and Advances in Wireless and IoT-enabled Networks, Springer, (2019)Enhancement in Data-Recovery and Re-Transmit Mechanisms of TCP., , , and . LCN Workshops, page 183-187. IEEE Computer Society, (2017)Modelling and Simulation of Resource constrained Vaccination Strategies and Epidemic Outbreaks., , , and . FIT, page 12-17. IEEE Computer Society, (2017)An Evaluation of Role Based Access Control Towards Easier Management Compared to Tight Security., , , and . ICFNDS, page 57:1-57:6. ACM, (2017)Performance Evaluation of TCP and UDP Traffic in IEEE 1451 Compliant Healthcare Infrastructure., , and . ICONIP (4), volume 7666 of Lecture Notes in Computer Science, page 396-403. Springer, (2012)