Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing the Internet of Things: Challenges, threats and solutions., , and . Internet Things, (2019)Network Protocols, Schemes, and Mechanisms for Internet of Things (IoT): Features, Open Challenges, and Trends., , and . Wirel. Commun. Mob. Comput., (2018)An analytical framework of a C-RAN supporting random, quasi-random and bursty traffic., , , , and . Comput. Networks, (2020)Analysing indirect Sybil attacks in randomly deployed Wireless Sensor Networks., , and . PIMRC, page 1-6. IEEE, (2016)VisIoT: A threat visualisation tool for IoT systems security., , and . ICC Workshops, page 2633-2638. IEEE, (2015)A Reinforcement learning-based cognitive MAC protocol., , , , and . ICC, page 5608-5613. IEEE, (2015)Resource Allocation Combining Heuristic Matching and Particle Swarm Optimization Approaches: The Case of Downlink Non-Orthogonal Multiple Access., and . Information, 10 (11): 336 (2019)Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information., , and . Expert Syst. Appl., 42 (21): 7560-7572 (2015)UAV IoT Framework Views and Challenges: Towards Protecting Drones as "Things"., , , and . Sensors, 18 (11): 4015 (2018)Utilizing Locality of Demand for Lower Response Times in Underwater Data Broadcasting., , , , and . VTC Spring, page 1-5. IEEE, (2011)