Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Confident Community to Secure Mobile Ad Hoc Networks., , , and . ICC, page 1254-1259. IEEE, (2007)Randomized energy aware routing algorithms in mobile ad hoc networks., , and . MSWiM, page 71-78. ACM, (2005)Traffic engineering in cloud data centers: A column generation approach., , , and . NOMS, page 1-5. IEEE, (2014)Network function virtualization scheduling with transmission delay optimization., , and . NOMS, page 638-644. IEEE, (2016)Special issue on security in mobile wireless networks., , , and . Secur. Commun. Networks, 3 (2-3): 99-101 (2010)A Two-Stage Protection Method for Detection and Mitigation of Coordinated EVSE Switching Attacks., , , and . IEEE Trans. Smart Grid, 12 (5): 4377-4388 (2021)Latency and Reliability Aware Edge Computation Offloading in IRS-aided Networks., , , , and . ICC, page 5035-5040. IEEE, (2022)RPM: Ransomware Prevention and Mitigation Using Operating Systems' Sensing Tactics., , , and . ICC, page 1-6. IEEE, (2023)NOMA-Aided UAV Data Collection from Time-Constrained IoT Devices., , , and . ICC, page 1-6. IEEE, (2022)Joint Resource and Power Allocation for URLLC-eMBB Traffics Multiplexing in 6G Wireless Networks., , , and . ICC, page 1-6. IEEE, (2021)