From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles., , , , , и . CrownCom/WiCON, том 427 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 343-360. Springer, (2021)DVD: Decentralized Verification of Diplomas in Smart Universities., , , и . ACIT, стр. 1-7. IEEE, (2023)Adaptive scheme for collaborative mobile sensing in wireless sensor networks: Bacterial foraging optimization approach., , , , , и . PIMRC, стр. 1-6. IEEE, (2016)DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data., , , , и . IEEE Access, (2022)The Impact of the Adversary's Eavesdropping Stations on the Location Privacy Level in Internet of Vehicles., , , , и . SEEDA-CECNSM, стр. 1-6. IEEE, (2020)On-Off Attacks Mitigation against Trust Systems in Wireless Sensor Networks., , и . CIIA, том 456 из IFIP Advances in Information and Communication Technology, стр. 406-415. Springer, (2015)EPP: Extreme Points Privacy for Trips and Home Identification in Vehicular Social Networks., , и . JERI, том 2351 из CEUR Workshop Proceedings, CEUR-WS.org, (2019)Insiders Detection in the Uncertain IoD using Fuzzy Logic., и . ACIT, стр. 1-6. IEEE, (2022)Toward a real-time TCP SYN Flood DDoS mitigation using Adaptive Neuro-Fuzzy classifier and SDN Assistance in Fog Computing., , , , , , и . CoRR, (2023)Geographic routing protocols for underwater wireless sensor networks: a survey., , , и . CoRR, (2014)