Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new approach to web users clustering and validation: a divergence-based scheme., , , and . Int. J. Web Inf. Syst., 5 (3): 348-371 (2009)A Multi-Protocol Software-Defined Networking Solution for the Internet of Things., , , , and . IEEE Commun. Mag., 57 (10): 42-48 (2019)Pairing-Based Cryptography on the Internet of Things: A Feasibility Study., , , , and . WWIC, volume 10866 of Lecture Notes in Computer Science, page 219-230. Springer, (2018)Load-Aware Scheduling in Local Area Networks Using Clustering., , , , , and . CSCN, page 93. IEEE, (2022)Security analysis of NFC relay attacks using probabilistic model checking., , and . IWCMC, page 524-529. IEEE, (2014)Demo abstract: An experimentation facility enabling flexible network control for the Internet of Things., , , , and . INFOCOM Workshops, page 992-993. IEEE, (2017)Energy-efficiency analysis under QoS constraints using formal methods: A study on EPONs., , and . ICC, page 1-6. IEEE, (2017)Formal Methods for Energy-Efficient EPONs., , and . TGCN, 2 (1): 246-259 (2018)Quantitative model checking for assessing the energy impact of a MITM attack on EPONs., , , and . Internet Technol. Lett., (2022)Time-Aware Web Users' Clustering., , , and . IEEE Trans. Knowl. Data Eng., 20 (5): 653-667 (2008)