Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cybersecurity Fusion: Leveraging Mafia Game Tactics and Reinforcement Learning for Botnet Detection., , , , and . GLOBECOM, page 6005-6011. IEEE, (2023)Energy-efficient coverage protocol based on stable and predictive scheduling in wireless sensor networks., , , and . Comput. Networks, (2017)A Deep Transfer Learning-Powered EDoS Detection Mechanism for 5G and Beyond Network Slicing., , , and . GLOBECOM, page 4747-4753. IEEE, (2023)Deep Learning for GPS Spoofing Detection in Cellular-Enabled UAV Systems., , , and . NaNA, page 501-506. IEEE, (2021)Secure pairwise broadcast time synchronization in wireless sensor networks., , and . DCOSS, page 1-6. IEEE Computer Society, (2011)Accelerated Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks., , , and . CSE, page 633-639. IEEE Computer Society, (2012)Energy-aware Collision Avoidance stochastic Optimizer for a UAVs set., , , and . IWCMC, page 1636-1641. IEEE, (2020)RTCP: a redundancy aware topology control protocol for wireless sensor networks., , , and . Int. J. Inf. Commun. Technol., 12 (3/4): 271-298 (2018)Reinforcement Learning-Based Slice Isolation Against DDoS Attacks in Beyond 5G Networks., , , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 3930-3946 (September 2023)An Enhanced Secure Pairwise Broadcast Time Synchronization Protocol in Wireless Sensor Networks., , and . PDP, page 569-573. IEEE Computer Society, (2014)