Author of the publication

Hybrid Simulation Based Approach for Embedded Systems Reliability Analysis.

, and . Int. J. Embed. Real Time Commun. Syst., 4 (4): 27-47 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RFID Authentication Protocols Based on Error-Correcting Codes: A Survey., , , and . Wireless Personal Communications, 96 (1): 509-527 (2017)ArA*summarizer: An Arabic text summarization system based on subtopic segmentation and using an A* algorithm for reduction., , and . Expert Syst. J. Knowl. Eng., (2020)Analysis of hybrid router-assisted reliable multicast protocols in lossy networks., , and . Int. Arab J. Inf. Technol., 14 (1): 26-34 (2017)Pruned improved eight-point approximate DCT for image encoding in visual sensor networks requiring only ten additions., , , and . J. Real Time Image Process., 17 (5): 1597-1608 (2020)Using Screen Brightness to Improve Security in Mobile Social Network Access., , , , , and . IEEE Trans. Dependable Secur. Comput., 15 (4): 621-632 (2018)Security Ontology for Semantic SCADA., and . ICWIT, volume 867 of CEUR Workshop Proceedings, page 179-192. CEUR-WS.org, (2012)UML Modeling and Formal Verification of Control/Data Driven Embedded Systems., and . ICECCS, page 311-316. IEEE Computer Society, (2009)An Authentication Protocol Based on Combined RFID-Biometric System RFID-Biometric System, , and . CoRR, (2012)Energy efficient with time synchronised and service coverage guarantee in wireless sensor networks., , and . Int. J. Commun. Networks Distributed Syst., 21 (1): 56-79 (2018)Weaknesses in Two RFID Authentication Protocols., , , and . C2SI, volume 9084 of Lecture Notes in Computer Science, page 162-172. Springer, (2015)