Author of the publication

Jamming Attack Analysis of Wireless Power Transfer on LoRaWAN Join Procedure.

, , and . GLOBECOM Workshops, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Realizing an Implementation Platform for Closed Loop Cyber-Physical Systems Using Blockchain., , , and . VTC Spring, page 1-5. IEEE, (2019)Protecting IoTs from Mirai Botnet Attacks Using Blockchains., , , and . CAMAD, page 1-6. IEEE, (2019)A Lightweight Blockchain Based Two Factor Authentication Mechanism for LoRaWAN Join Procedure., , , , and . ICC Workshops, page 1-6. IEEE, (2019)Jamming Attack Analysis of Wireless Power Transfer on LoRaWAN Join Procedure., , and . GLOBECOM Workshops, page 1-6. IEEE, (2018)A blockchain-based adaptive middleware for large scale internet of things data storage selection.. Middleware Doctoral Symposium, page 17-19. ACM, (2019)Securing the LoRaWAN join procedure using blockchains., , , , , and . Clust. Comput., 23 (3): 2123-2138 (2020)Towards a middleware design for efficient blockchain oracles selection., , and . BCCA, page 55-62. IEEE, (2022)BlockAM: An Adaptive Middleware for Intelligent Data Storage Selection for Internet of Things., , and . DAPPS, page 61-71. IEEE, (2020)BlockAIM: A Neural Network-Based Intelligent Middleware For Large-Scale IoT Data Placement Decisions., , and . IEEE Trans. Mob. Comput., 22 (1): 84-99 (2023)Network Intrusion Detection System for Jamming Attack in LoRaWAN Join Procedure., , , , , and . ICC, page 1-6. IEEE, (2018)