Author of the publication

Securing the Communication in Private Heterogeneous Mobile Ad hoc Networks.

, , , , and . Wirel. Pers. Commun., 52 (2): 393-409 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Awareness in Software-Defined Multi-Domain 5G Networks., , , , and . Future Internet, 10 (3): 27 (2018)Micro-Segmenting 5G., , , , , and . IoTBDS, page 17-28. SciTePress, (2018)Adaptive Risk Management with Ontology Linked Evidential Statistics and SDN., , and . ECSA Workshops, page 2:1-2:7. ACM, (2014)Boosting 5G on Smart Grid Communication: A Smart RAN Slicing Approach., , , , , , , , , and . IEEE Wirel. Commun., 30 (5): 170-178 (October 2023)CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED WIDE AREA NETWORKS, and . International Journal of Computer Networks & Communications (IJCNC), 11 (5): 113-132 (September 2019)Edge MLOps: An Automation Framework for AIoT Applications., , , and . IC2E, page 191-200. IEEE, (2021)Securing the Communication in Private Heterogeneous Mobile Ad hoc Networks., , , , and . Wirel. Pers. Commun., 52 (2): 393-409 (2010)Securing VNF communication in NFVI., , , , and . CSCN, page 187-192. IEEE, (2017)Mobile Active Overlay., , , and . IWAN, volume 1942 of Lecture Notes in Computer Science, page 416-422. Springer, (2000)