Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modelization and analysis of dynamic heterogeneous redundant system., , , , , and . Concurr. Comput. Pract. Exp., (2022)Smart Resource Allocation Using Reinforcement Learning in Content-Centric Cyber-Physical Systems., , , and . SmartCom, volume 10699 of Lecture Notes in Computer Science, page 39-52. Springer, (2017)Blockchain-Based Multisignature Lock for UAC in Metaverse., , , , , and . IEEE Trans. Comput. Soc. Syst., 10 (5): 2201-2213 (October 2023)SA-EAST: Security-Aware Efficient Data Transmission for ITS in Mobile Heterogeneous Cloud Computing., , , , and . ACM Trans. Embed. Comput. Syst., 16 (2): 60:1-60:22 (2017)Achieving a Covert Channel over an Open Blockchain Network., , , , and . IEEE Netw., 34 (2): 6-13 (2020)Scientific Workflows in IoT Environments: A Data Placement Strategy Based on Heterogeneous Edge-Cloud Computing., , , , , and . ACM Trans. Manag. Inf. Syst., 13 (4): 42:1-42:26 (December 2022)A Framework for Mimic Defense System in Cyberspace., , , , , and . J. Signal Process. Syst., 93 (2-3): 169-185 (2021)Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing., , , , and . J. Netw. Comput. Appl., (2016)A survey on FinTech., , and . J. Netw. Comput. Appl., (2018)An Approach of Secure Two-Way-Pegged Multi-sidechain., , , and . ICA3PP (2), volume 11945 of Lecture Notes in Computer Science, page 551-564. Springer, (2019)