Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Blockchain-based Adaptive Trust Management in Wireless Sensor Networks., , , and . eIT, page 163-168. IEEE, (2023)Software Development Models for IoT., and . CCWC, page 524-530. IEEE, (2022)Security Challenges of Blockchain-Based Supply Chain Systems., and . UEMCON, page 1-6. IEEE, (2022)Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks., , , , , and . J. Netw. Comput. Appl., 35 (6): 2068-2080 (2012)Boosting-based Models with Tree-structured Parzen Estimator Optimization to Detect Intrusion Attacks on Smart Grid., , and . UEMCON, page 165-170. IEEE, (2021)A Comparative Study of Lightweight Machine Learning Techniques for Cyber-Attacks Detection in Blockchain-Enabled Industrial Supply Chain., , , and . IEEE Access, (2024)Evaluating Cache Power Dissipation Across Different Process Technologies., , , and . AICCSA, page 1-5. IEEE Computer Society, (2018)Object Tracking in Wireless Sensor Networks: Challenges and Solutions., , and . J. Comput. Sci., 12 (4): 201-212 (2016)A Blockchain-Based Fish Supply Chain Framework for Maintaining Fish Quality and Authenticity., , , , and . IEEE Trans. Serv. Comput., 17 (5): 1877-1886 (September 2024)A Comparative Study of Machine Learning Models for Cyber-attacks Detection in Wireless Sensor Networks., , , and . UEMCON, page 313-318. IEEE, (2021)