Author of the publication

A study on the sensor network authentication by utilizing a Brownian motion behavior.

, , , and . ICTC, page 14-18. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stacked borrows: an aliasing model for Rust., , , and . Proc. ACM Program. Lang., 4 (POPL): 41:1-41:32 (2020)RCOAP: A Rate Control Scheme for Reliable Bursty Data Transfer in IoT Networks., and . IEEE Access, (2021)Simuliris: a separation logic framework for verifying concurrent program optimizations., , , , , , , and . Proc. ACM Program. Lang., 6 (POPL): 1-31 (2022)Reliability-Security Analysis for Harvest-to-Jam based Multi-hop Cluster MIMO Networks Using Cooperative Jamming Methods Under Impact of Hardware Impairments., , , , and . EAI Endorsed Trans. Ind. Networks Intell. Syst., 8 (28): e5 (2021)A PCA-based method for IoT network traffic anomaly detection., and . ICACT, page 381-386. IEEE, (2018)Evaluating the security levels of the Web-Portals based on the standard ISO/IEC 15408., and . SoICT, page 463-469. ACM, (2018)Detecting Anomalous Network Traffic in IoT Networks., and . ICACT, page 1143-1152. IEEE, (2019)Recent challenges, trends, and concerns related to IoT security: An evolutionary study., , , and . ICACT, page 405-410. IEEE, (2018)Adaptive Bandwidth Scheduling in B-ISDN.. HPCN Europe, volume 1401 of Lecture Notes in Computer Science, page 946-951. Springer, (1998)A Secure Network Architecture for Heterogeneous IoT Devices using Role-based Access Control., , , and . SoftCOM, page 1-5. IEEE, (2019)