Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

6G-BRICKS: Building Reusable Testbed Infrastructures for Cloud-to-Device Breakthrough Technologies., , , , , , , , , and 8 other author(s). GLOBECOM (Workshops), page 751-756. IEEE, (2023)Enhancing Space Security Utilizing the Blockchain: Current Status and Future Directions., and . WiSEE, page 77-82. IEEE, (2022)An Improved GMPLS Survivability Mechanism using Link Delay-constrained Algorithm., , and . DCNET/OPTICS, page 45-50. SciTePress, (2011)Reinforcement Learning-Based Anomaly Detection for Internet of Things Distributed Ledger Technology., and . ISCC, page 1-7. IEEE, (2021)Easily verified IP watermarking., and . DTIS, page 1-2. IEEE, (2014)Power-Aware and QoS Provisioned Real Time Multimedia Transmission in Small Cell Networks., , , and . Int. J. Wirel. Networks Broadband Technol., 5 (1): 24-45 (2016)Power-Aware QoS Provisioning in OFDMA Small Cell Networks., , and . CIT/IUCC/DASC/PICom, page 725-730. IEEE, (2015)Towards Privacy-First Security Enablers for 6G Networks: The PRIVATEER Approach., , , , , , , , , and 15 other author(s). SAMOS, volume 14385 of Lecture Notes in Computer Science, page 379-391. Springer, (2023)