Author of the publication

Ransomware Attacks Detection Methodology to Protect IoT-Enabled Critical Infrastructures.

, , , , , , , and . GLOBECOM, page 6037-6042. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Special issue: Advanced technology for smart home automation and entertainment., , , and . Personal and Ubiquitous Computing, 22 (1): 1-2 (2018)Foreword by Guest Editors for the Special Issue on the 2013 ICUFN Conference., , and . Wireless Personal Communications, 78 (4): 1827-1831 (2014)IoT 5G-UDN Protocols: Practical Model and Evaluation., , , , , and . ICC Workshops, page 1-6. IEEE, (2018)Electromagnetic characterization of SNR variation in passive Gen2 RFID system., , , , and . ICUFN, page 172-175. IEEE, (2017)Performance evaluation of an enhanced cryptography solution for m-Health applications in cooperative environments., , , and . GLOBECOM, page 1711-1716. IEEE, (2013)Relay power allocation in auction-based game approach., , , and . GLOBECOM, page 1812-1817. IEEE, (2012)A Fan-Based Smart Selective Trap for Flying Insects., , , , , and . LATINCOM, page 1-5. IEEE, (2018)Breast Alert: An On-line Tool for Predicting the Lifetime Risk of Women Breast Cancer., , , and . J. Medical Systems, 36 (3): 1417-1424 (2012)A New Energy Prediction Approach for Intrusion Detection in Cluster-Based Wireless Sensor Networks., , , , and . GreeNets, volume 51 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1-12. Springer, (2011)Trust assistance in Sensor-Cloud., , , , , and . INFOCOM Workshops, page 342-347. IEEE, (2015)