Author of the publication

An Investigation of Security Trends in Personal Wireless Networks.

, , , , and . Wirel. Pers. Commun., 75 (3): 1669-1687 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast relaxed inertial Tseng's method-based algorithm for solving variational inequality and fixed point problems in Hilbert spaces., , , , and . J. Comput. Appl. Math., (2023)Loss Guided Activation for Action Recognition in Still Images., , and . ACCV (5), volume 11365 of Lecture Notes in Computer Science, page 152-167. Springer, (2018)Respiration Symptoms Monitoring in Body Area Networks, , , and . Applied Sciences, 8 (4): 568 (April 2018)Understanding the onset of hot streaks across artistic, cultural, and scientific careers, , , , and . (2021)cite arxiv:2103.01256.Advanced Information Technology Convergence 2017., , , , and . J. Electr. Comput. Eng., (2017)Collaborative Actuation of Wireless Sensor and Actuator Networks for the Agriculture Industry., , , , , and . IEEE Access, (2017)Indoor 3D Point Cloud Segmentation Based on Multi-Constraint Graph Clustering., , , , , and . Remote. Sens., 15 (1): 131 (January 2023)Security Identification Technologies for Stone Arch Bridges at Service., , and . Intell. Autom. Soft Comput., 18 (6): 695-701 (2012)Modeling user multiple interests by an improved GCS approach., , , and . Expert Syst. Appl., 29 (4): 757-767 (2005)Cooperative Message Authentication in Vehicular Cyber-Physical Systems., , , , and . IEEE Trans. Emerg. Top. Comput., 1 (1): 84-97 (2013)