Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical Location Service with Prediction in Mobile Ad-Hoc Networks, , and . CoRR, (2010)Colour image encryption based on an improved fractional-order logistic map., , , and . Int. J. Electron. Secur. Digit. Forensics, 15 (1): 66-87 (2023)Adaptive Channel Allocation for Wireless PCN., and . Mob. Networks Appl., 4 (2): 111-116 (1999)Security in VANETs: Lightweight Protocol for Group-of-Vehicles Masters (LPGVM)., , and . ICACT, page 6-11. IEEE, (2020)An Orthogonal Air Pollution Monitoring Method (OAPM) Based on LoRaWAN., , , and . J. Sens. Actuator Networks, 9 (3): 42 (2020)Evaluating the Upper Bound of Energy Cost Saving by Proactive Data Center Management., , , and . IEEE Trans. Netw. Serv. Manag., 17 (3): 1527-1541 (2020)Combined Forest: a New Supervised Approach for a Machine-Learning-based Botnets Detection., , , and . GLOBECOM, page 1-6. IEEE, (2021)Unsupervised Anomaly Knowledge Flow: a Digital Signatures Extraction Approach., and . WINCOM, page 1-6. IEEE, (2023)Cost Reduction Bounds of Proactive Management Based on Request Prediction., , , and . HPCS, page 864-871. IEEE, (2019)Fault-Tolerant Mechanism for Multimedia Transmission in Wireless Sensor Networks., , , and . VTC Fall, page 1-6. IEEE, (2016)