Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things., , , , , and . ACM Trans. Sens. Networks, 18 (2): 29:1-29:41 (2022)A Spatial Source Location Privacy-aware Duty Cycle for Internet of Things Sensor Networks., , and . ACM Trans. Internet Things, 2 (1): 4:1-4:32 (2020)Challenges in Identifying Network Attacks Using Netflow Data., , , and . NCA, page 1-10. IEEE, (2021)Secure Allocation for Graph-Based Virtual Machines in Cloud Environments., and . PST, page 1-7. IEEE, (2021)Auditability: An Approach to Ease Debugging of Reliable Distributed Systems., and . PRDC, page 227-235. IEEE, (2019)Transaction Fee Mechanism for Order-Sensitive Blockchain-Based Applications., , and . ESORICS Workshops (1), volume 14398 of Lecture Notes in Computer Science, page 327-343. Springer, (2023)Reliable Logging in Wireless IoT Networks in the Presence of Byzantine Faults., and . TrustCom, page 17-25. IEEE, (2021)Fault-Tolerant Ant Colony Based-Routing in Many-to-Many IoT Sensor Networks., and . NCA, page 1-10. IEEE, (2021)Sentiment Analysis based Error Detection for Large-Scale Systems., , , , and . DSN, page 237-249. IEEE, (2021)Protocol transformation for transiently powered wireless sensor networks., , and . SAC, page 1112-1121. ACM, (2021)