Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UAV SECaaS: Game-Theoretic Formulation for Security as a Service in UAV Swarms., , , and . IEEE Syst. J., 16 (4): 6209-6218 (2022)Cracking the Anonymous IoT Routing Networks: A Deep Learning Approach., , , and . IEEE Internet Things Mag., 6 (1): 120-126 (March 2023)Lightweight Authentication Protocol for Inter Base Station Communication in Heterogeneous Networks., and . INFOCOM Workshops, page 871-876. IEEE, (2020)SmartChain: A Smart and Scalable Blockchain Consortium for Smart Grid Systems., , , , and . ICC Workshops, page 1-6. IEEE, (2019)A Machine Learning Approach for Traffic Flow Provisioning in Software Defined Networks., , and . ICOIN, page 602-607. IEEE, (2020)Scalable Topologies for Time-Optimal Authentication of UAV Swarms., , , and . IEEE Netw., 36 (6): 126-132 (2022)Fault Resilient Authentication Architecture for Drone Networks., and . ICC Workshops, page 866-871. IEEE, (2022)Location Aware Clustering: Scalable Authentication Protocol for UAV Swarms., and . IEEE Netw. Lett., 3 (4): 177-180 (2021)SHOTS: Scalable Secure Authentication-Attestation Protocol Using Optimal Trajectory in UAV Swarms., , , and . IEEE Trans. Veh. Technol., 71 (6): 5827-5836 (2022)Next generation stock exchange: Recurrent neural learning model for distributed ledger transactions., , , , and . Comput. Networks, (2021)