Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine Learning in IoT Security: Current Solutions and Future Challenges., , , and . IEEE Commun. Surv. Tutorials, 22 (3): 1686-1721 (2020)On the Blockchain-Based General-Purpose Public Key Infrastructure., , , , , and . AICCSA, page 1-8. IEEE Computer Society, (2019)Johar: a framework for developing accessible applications., and . ASSETS, page 243-244. ACM, (2009)Distributed Slot Allocation in Capillary Gateways for Internet of Things Networks., and . VTC Fall, page 1-6. IEEE, (2016)Taxonomy-Based Intelligent Malware Detection Framework., , , , and . GLOBECOM, page 1-6. IEEE, (2019)MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles., , , , and . IEEE Internet of Things Journal, 7 (4): 3310-3322 (2020)A Novel Optimal Precoder and Equalizer in $22$ MIMO VLC Systems for Vehicular Application., , , and . GLOBECOM Workshops, page 1-6. IEEE, (2018)VLC Enabled Foglets Assisted Road Asset Reporting., , , and . VTC Spring, page 1-6. IEEE, (2017)A Novel TCP/IP Header Hijacking Attack on SDN., , , , , , and . INFOCOM Workshops, page 1-2. IEEE, (2022)Multi-Band Multi-Hop WLANs for Disaster Relief and Public Safety Applications., , , , and . WCNC Workshops, page 1-6. IEEE, (2020)