Author of the publication

Survey and classification of Dos and DDos attack detection and validation approaches for IoT environments.

, , , and . Internet Things, (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Real Time Adaptive Scheduling Scheme for Multi-Service Flows in WiMAX Networks., , and . GLOBECOM, page 1652-1656. IEEE, (2008)A Trust-Based Routing Protocol for Ad Hoc Networks., , and . MWCN, volume 162 of IFIP, page 251-262. Kluwer/Springer, (2004)Data security in ad hoc networks using multipath routing., and . PIMRC, page 1331-1335. IEEE, (2003)An Energy Efficient Priority-Based QoS MAC Protocol for Wireless Sensor Networks., , and . ICC, page 1-6. IEEE, (2011)On the applicability of SAN in modeling and analyzing a Priority Queue Management based congestion control for WMSNs., , and . ICC, page 1-6. IEEE, (2017)Security equipment in ad hoc networks., and . VTC Spring, page 1819-1823. IEEE, (2002)Dynamic power control for energy harvesting wireless multimedia sensor networks., , , , and . EURASIP J. Wireless Comm. and Networking, (2012)A game-theoretic approach for non-overlapping communities detection., , , and . IWCMC, page 1315-1320. IEEE, (2017)New User Association Scheme Based on Multi-Objective Optimization for 5G Ultra-Dense Multi-RAT HetNets., , , and . ICC, page 1-6. IEEE, (2018)Call Admission Control in Small Cell Networks with Retrials and Guard Channels., , , and . GLOBECOM, page 1-6. IEEE, (2016)