Author of the publication

Energy-efficient node position identification through payoff matrix and variability analysis.

, , , , , , and . Telecommun. Syst., 65 (3): 459-477 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Proposal to Distinguish DDoS Traffic in Flash Crowd Environments., , , , , , and . Int. J. Inf. Secur. Priv., 16 (1): 1-16 (2022)IFS - Intrusion forecasting system based on collaborative architecture., and . ICDIM, page 217-222. IEEE, (2009)Communication Middleware to Distributed Multimedia Application on High Speed Multi-service Networks: Design and experiences., , and . IMSA, page 294-299. IASTED/ACTA Press, (2002)IDS 3G - Third generation for intrusion detection: Applying forecasts and return on security investment to cope with unwanted traffic., and . ICITST, page 1-6. IEEE, (2009)Predicting model for identifying the malicious activity of nodes in MANETs., , , , , , and . ISCC, page 700-707. IEEE Computer Society, (2015)Grouping detection and forecasting security controls using unrestricted cooperative bargains., , , , and . Comput. Commun., (2019)Analysis and Implementation of a Pre-defined QoS Specification Methodology for VoD Systems., , , and . IMSA, page 406-411. IASTED/ACTA Press, (2001)Evaluation of theora and speex performance in IP videoconferencing., , , and . WebMedia, page 135-138. ACM, (2012)Performance evaluation of publish-subscribe systems in IoT using energy-efficient and context-aware secure messages., , , and . J. Cloud Comput., (2022)Analysis and handling of biased data provided by wireless sensor networks with lack of energy., , , , , , and . Int. J. Sens. Networks, 41 (3): 137-151 (2023)