Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MS-WMSN: service-oriented planning tool for wireless multimedia monitoring services., , and . Int. J. Inf. Commun. Technol., 8 (1): 50-68 (2016)AI-Based Autonomic and Scalable Security Management Architecture for Secure Network Slicing in B5G., , and . IEEE Netw., 36 (6): 165-174 (2022)Cybersecurity Fusion: Leveraging Mafia Game Tactics and Reinforcement Learning for Botnet Detection., , , , and . GLOBECOM, page 6005-6011. IEEE, (2023)Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G., , and . Comput. Networks, (2022)Energy-efficient coverage protocol based on stable and predictive scheduling in wireless sensor networks., , , and . Comput. Networks, (2017)Deep-Ensemble-Learning-Based GPS Spoofing Detection for Cellular-Connected UAVs., , , , and . IEEE Internet Things J., 9 (24): 25068-25085 (2022)Deep Learning for GPS Spoofing Detection in Cellular Enabled Unmanned Aerial Vehicle Systems., , , and . CoRR, (2022)Energy-aware Collision Avoidance stochastic Optimizer for a UAVs set., , , and . IWCMC, page 1636-1641. IEEE, (2020)Deep Learning for GPS Spoofing Detection in Cellular-Enabled UAV Systems., , , and . NaNA, page 501-506. IEEE, (2021)Accelerated Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks., , , and . CSE, page 633-639. IEEE Computer Society, (2012)