Author of the publication

Game-based Resource Allocation for Secure UAV Communication in Wireless Networks.

, , , , and . ECAI, page 1-6. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications., , , and . Information, 11 (3): 130 (2020)FaitH: Trusted Chain Network for Non-Cooperative D2D Communication Underlying HetNet., , , , , and . ECAI, page 1-6. IEEE, (2021)PoRF: Proof-of-Reputation-based Consensus Scheme for Fair Transaction Ordering., , , , , and . ECAI, page 1-6. IEEE, (2021)A Machine Learning Approach to Classify Network Traffic., , , , and . ECAI, page 1-6. IEEE, (2021)Fuzzy approach on modelling cyber attacks patterns on data transfer in industrial control systems., and . CoRR, (2019)Method for authentication of sensors connected on Modbus TCP., , , , and . CoDIT, page 679-683. IEEE, (2017)A multi-agent system for management of control functions as services in onshore oilfield., , , , and . ECAI, page 1-5. IEEE, (2017)Considerations regarding security issues impact on systems availability., , , , and . ECAI, page 1-6. IEEE, (2016)Assessing the security risks of a wireless sensor network from a gas compressor station., and . ECAI, page 45-50. IEEE, (2014)FPGA Implementation of SIMON-128 Cryptographic Algorithm Using Artix-7., , , , , and . ECAI, page 1-5. IEEE, (2022)