Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Allocation of network MW flows to bilateral transactions.. APCCAS, page 859-862. IEEE, (2010)Transfer Capability Computations in Deregulated Power Systems., , and . HICSS, IEEE Computer Society, (2000)Energy Smart Grid Cyber-Threat Exposure Analysis and Evaluation Framework., , and . iiWAS, page 163-169. ACM, (2014)SecureCyber: Risk-Based Optimization through Common Vulnerability Systems Scoring Over Energy Smart Grid., , and . iiWAS, page 190-195. ACM, (2014)Architecting and Development of the SecureCyber: A SCADA Security platform Over Energy Smart Grid., , and . iiWAS, page 170-174. ACM, (2014)Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment. International Journal of Computer Networks & Communications (IJCNC), 15 (4): 55-71 (July 2023)A promising Ka band leaky-wave antenna based on a periodic structure of non-identical irregularities., , , , and . EURASIP J. Wirel. Commun. Netw., 2022 (1): 97 (2022)Automatic Modulation Classification: Convolutional Deep Learning Neural Networks Approaches., , , , , and . IEEE Access, (2023)Meta-heuristic Algorithms for Solving The 3D Volume Coverage Problem Using Multi-UAVs., , , , , , and . NILES, page 194-199. IEEE, (2022)Performance Analysis of Centralized Vs Decentralized Control of an Intelligent Autonomous Intersection., , and . SM, page 8-13. IEEE, (2022)