Author of the publication

Theoretical Analysis on Edge Computation Offloading Policies for IoT Devices.

, , , , , and . IEEE Internet Things J., 6 (3): 4228-4241 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application-aware and Dynamic Security Function Chaining for Mobile Networks., , , and . J. Internet Serv. Inf. Secur., 7 (4): 21-34 (2017)EmuStack: An OpenStack-Based DTN Network Emulation Platform (Extended Version)., , , , and . Mob. Inf. Syst., (2016)Adaptive service function chaining mappings in 5G using deep Q-learning., , , , , and . Comput. Commun., (2020)Rule Anomaly-Free Mechanism of Security Function Chaining in 5G., , , , , and . IEEE Access, (2018)Efficient Federated DRL-Based Cooperative Caching for Mobile Edge Networks., , , , , , and . IEEE Trans. Netw. Serv. Manag., 20 (1): 246-260 (March 2023)MTF: Mitigating Link Flooding Attacks in Delay Tolerant Networks., , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1532-1539. IEEE, (2018)SAT-GRD: An ID/Loc split network architecture interconnecting satellite and ground networks., , , , and . ICC, page 1-6. IEEE, (2016)Enabling Efficient Service Function Chains at Terrestrial-Satellite Hybrid Cloud Networks., , , , , and . IEEE Netw., 33 (6): 94-99 (2019)Accurate Detection of IoT Sensor Behaviors in Legitimate, Faulty and Compromised Scenarios., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (1): 288-300 (2023)Theoretical Analysis on Edge Computation Offloading Policies for IoT Devices., , , , , and . IEEE Internet Things J., 6 (3): 4228-4241 (2019)