Author of the publication

A Survey on Cyber Security Threats in IoT-Enabled Maritime Industry.

, , , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (2): 2677-2690 (February 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Artificial neural network-based cardiovascular disease prediction using spectral features., , , , , , , and . Comput. Electr. Eng., (2022)A Dynamic DL-Driven Architecture to Combat Sophisticated Android Malware., , , , , and . IEEE Access, (2020)Integrated Multi Mobile Object Scheme for Ubiquitous Sensor Network., , , , , and . CSA, page 1-6. IEEE, (2009)A survey on routing protocols supported by the Contiki Internet of things operating system., , , , and . Future Gener. Comput. Syst., (2018)Development of a seismic-wind load effect experiment system for built-in guide rail building maintenance robot., , , and . CASE, page 1016-1021. IEEE, (2012)Resource Allocation Based on Traffic Load over Relayed Wireless Access Networks., and . ICESS, volume 3820 of Lecture Notes in Computer Science, page 441-451. Springer, (2005)A Social Movements Perspective on "Issue" Surfacing in Brand Communities., and . AMCIS, Association for Information Systems, (2011)The Role of Electronic Word-of-Mouth on Stakeholders' Perceptions: Can Online Opinion Impact Managers' Futures?, , and . AMCIS, Association for Information Systems, (2015)Who Is My Audience? Investigating Stakeholder Collapse in Online Social Platforms., , and . WEB, volume 258 of Lecture Notes in Business Information Processing, page 78-82. Springer, (2015)Cross-Layer Scheduling Algorithm for WLAN Throughput Improvement.. ISPA Workshops, volume 4331 of Lecture Notes in Computer Science, page 322-331. Springer, (2006)