Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust Evaluation Mechanism for User Recruitment in Mobile Crowd-Sensing in the Internet of Things., , , and . IEEE Trans. Inf. Forensics Secur., 14 (10): 2705-2719 (2019)An Investigation into Healthcare-Data Patterns., , , , , and . Future Internet, 11 (2): 30 (2019)Characterising a grid site's traffic., , , and . HPDC, page 707-716. ACM, (2010)Securing Health Care Information Systems using Visualisation Techniques., , , and . UKAIS, page 11. (2016)Density-Based Outlier Detection for Safeguarding Electronic Patient Record Systems., , , and . IEEE Access, (2019)Editorial for the Special Issue on 5G-Enabling Technologies and Wireless Networking.. Future Internet, 14 (11): 342 (2022)A Spectrum Management Platform Architecture to Enable a Sharing Economy in 6G., , , and . Future Internet, 14 (11): 309 (2022)Spatial organisation of the mesoscale connectome: A feature influencing synchrony and metastability of network dynamics., , and . PLoS Comput. Biol., (2023)Realizing Physical Layer Security in Large Wireless Networks using Spectrum Programmability., , , , , and . GLOBECOM (Workshops), page 1-6. IEEE, (2020)AP selection algorithm based on a potential game for large IEEE 802.11 WLANs., , , , , , and . NOMS, page 1-7. IEEE, (2018)