Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

REMA: A REsource MAnagement tool to improve the performance of vehicular delay-tolerant networks., , , , and . Veh. Commun., (2017)Mobile cloud computing in 5G: Emerging trends, issues, and challenges Guest Editorial., , , and . IEEE Netw., 29 (2): 4-5 (2015)Coordinate Channel-Aware Page Mapping Policy and Memory Scheduling for Reducing Memory Interference Among Multimedia Applications., , , and . IEEE Syst. J., 11 (4): 2839-2851 (2017)Diffusion Distance-Based Predictive Tracking for Continuous Objects in Industrial Wireless Sensor Networks., , , , and . Mob. Networks Appl., 24 (3): 971-982 (2019)An efficient approach of secure group association management in densely deployed heterogeneous distributed sensor network., , , , and . Secur. Commun. Networks, 4 (9): 1013-1026 (2011)An Attack-Resistant Trust Model Based on Multidimensional Trust Metrics in Underwater Acoustic Sensor Network., , , and . IEEE Trans. Mob. Comput., 14 (12): 2447-2459 (2015)LOL: localization-free online keystroke tracking using acoustic signals., , , , , and . Soft Comput., 23 (21): 11063-11075 (2019)A Cross-Layer Protocol with High Reliability and Low Delay for Underwater Acoustic Sensor Networks., , , , and . QSHINE, volume 199 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 377-386. Springer, (2016)A New Energy Prediction Approach for Intrusion Detection in Cluster-Based Wireless Sensor Networks., , , , and . GreeNets, volume 51 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1-12. Springer, (2011)Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks., , , , and . Comput. J., 58 (6): 1280-1292 (2015)