Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ontology-based model for trusted critical site supervision in FUSE-IT., , , , , , , and . ICIN, page 313-315. IEEE, (2017)Towards a user privacy preservation system for IoT environments: a habit-based approach., and . FUZZ-IEEE, page 2425-2432. IEEE, (2016)Towards a New Graph-based Occupant Behavior Modeling in Smart Building., , , and . IWCMC, page 1809-1814. IEEE, (2019)Data Collection Period and Sensor Selection Method for Smart Building Occupancy Prediction., , , , , and . VTC Spring, page 1-6. IEEE, (2019)Bipolarity and the relational division., , and . EUSFLAT Conf., page 424-430. Atlantis Press, (2011)Intelligent Routing and Flow Control In MANETs., , , , , and . J. Comput. Inf. Technol., (2010)e-Learning Platform Ranking Method using a Symbolic Approach based on Preference Relations., , , and . CSEDU (1), page 114-122. SciTePress, (2016)Anomaly-based framework for detecting power overloading cyberattacks in smart grid AMI., , , and . Comput. Secur., (2020)Renting Out Cloud Services in Mobile Vehicular Cloud., , , , and . IEEE Trans. Veh. Technol., 67 (10): 9882-9895 (2018)Security and PrIvacy foR the Internet of Things: an overview of the project., , , , , , , , , and 4 other author(s). SMC, page 3993-3998. IEEE, (2019)