Author of the publication

Trustworthy data management for wireless networks in Cyber-Physical Systems.

, and . IPCCC, page 1-2. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security through Collaboration in MANETs., , and . CollaborateCom, volume 10 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 696-714. Springer / ICST, (2008)Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion., , , and . Secur. Commun. Networks, (2017)Cyberspace Security for Future Internet., , , , and . Secur. Commun. Networks, (2018)Synergistic Based Social Incentive Mechanism in Mobile Crowdsensing., , and . WASA, volume 10874 of Lecture Notes in Computer Science, page 767-772. Springer, (2018)Dynamic human contact prediction based on naive Bayes algorithm in mobile social networks., , , , and . Softw. Pract. Exp., 50 (11): 2031-2045 (2020)Few-shot learning for name entity recognition in geological text based on GeoBERT., , , , , and . Earth Sci. Informatics, 15 (2): 979-991 (2022)SAT: an SVM-based automated trust management system for Mobile Ad-hoc Networks., , and . MILCOM, page 1102-1107. IEEE, (2011)Trustworthy data management for wireless networks in Cyber-Physical Systems., and . IPCCC, page 1-2. IEEE Computer Society, (2013)Android app recommendation approach based on network traffic measurement and analysis., , , and . ISCC, page 988-994. IEEE Computer Society, (2015)A Message Matching Routing Algorithm Based on Node Sociality in Opportunistic Networks., , and . IIKI, volume 129 of Procedia Computer Science, page 175-177. Elsevier, (2017)