Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An outlier ensemble for unsupervised anomaly detection in honeypots data., , , and . Intell. Data Anal., 24 (4): 743-758 (2020)Modeling and improving named data networking over IEEE 802.15.4., , and . Ann. des Télécommunications, 76 (11-12): 839-850 (2021)Virtualization Techniques: Challenges and Opportunities., , , , and . MSPN, volume 10026 of Lecture Notes in Computer Science, page 49-62. Springer, (2016)Impact Analysis of Greedy Behavior Attacks in Vehicular Ad hoc Networks., , , , , , and . PEMWN, page 1-6. IEEE, (2021)Predicting Vehicles' Positions Using Roadside Units: A Machine-Learning Approach., , , and . CSCN, page 1-6. IEEE, (2018)Trusted Platforms to Secure Mobile Cloud Computing., and . HPCC/CSS/ICESS, page 1068-1075. IEEE, (2014)Robust approach for host-overload detection based on dynamic safety parameter., , , and . FiCloud, page 266-271. IEEE, (2022)CBUPRE to Secure MANETs from DoS Attacks., , and . MSPN, volume 9395 of Lecture Notes in Computer Science, page 163-175. Springer, (2015)Efficient and Lightweight Polynomial-Based Key Management Scheme for Dynamic Networks., , and . MSPN, volume 12605 of Lecture Notes in Computer Science, page 110-122. Springer, (2020)Parallel Applications Mapping onto Heterogeneous MPSoCs Interconnected Using Network on Chip., , and . MSPN, volume 12605 of Lecture Notes in Computer Science, page 123-143. Springer, (2020)