Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Centralized and Distributed Intrusion Detection for Resource-Constrained Wireless SDN Networks., , and . IEEE Internet Things J., 9 (10): 7746-7758 (2022)Multimetric Online Intrusion Detection in Software-Defined Wireless Sensor Networks., , and . LATINCOM, page 1-6. IEEE, (2020)Control and data traffic isolation in SDWSN using IEEE 802.15.4e TSCH., , and . SSP, page 126-130. IEEE, (2021)Ensuring applications' traffic isolation using IEEE 802.15.4e TSCH through SDWSN slicing., , and . SIoT, page 1-4. IEEE, (2022)An Analytic-Deterministic Model for Traffic Prioritization in Software Defined Networks with Network Calculus., , , , , and . SBRC, page 70-80. IEEE Computer Society, (2015)TinySDN: Enabling multiple controllers for software-defined wireless sensor networks., , and . LATINCOM, page 1-6. IEEE, (2014)Design of a Gateway-based relay node for LoRaWAN multihop networks., , and . SIoT, page 1-4. IEEE, (2022)Performance trade offs in IoT-based traffic monitoring and incident detection systems., and . SIoT, page 1-4. IEEE, (2022)Distributed DoS Attack Detection in SDN: Tradeoffs in Resource Constrained Wireless Networks., , and . SSP, page 131-135. IEEE, (2021)No way back? An SDN protocol for directed IoT networks., , and . WONS, page 1-8. IEEE / IFIP, (2019)