Author of the publication

Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure.

, , , , , and . Trans. Emerg. Telecommun. Technol., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance analysis of clustering protocols in WSN., , , and . WMNC, page 1-6. IEEE, (2013)Robust compression and transmission of MPEG-4 video., , , , and . ACM Multimedia (1), page 113-120. ACM, (1999)Clustering in WSN Using Node Ranking with Hybrid Nodes Duty-Cycle and Energy Threshold., , and . NCA, page 245-252. IEEE Computer Society, (2014)AI-powered biometrics for Internet of Things security: A review and future vision., , , and . J. Inf. Secur. Appl., (2024)Using Blockchains to Secure Distributed Energy Exchange., , , and . CoDIT, page 622-627. IEEE, (2018)Energy Routing Algorithms for the Energy Internet., , and . IEEE Conf. on Intelligent Systems, page 80-86. IEEE, (2018)A framework for pipeline infrastructure monitoring using wireless sensor networks., , and . WTS, page 1-7. IEEE, (2007)A Layered Blockchain Framework for Healthcare and Genomics., , , and . SMARTCOMP, page 156-163. IEEE, (2020)Quality of service analysis and resource allocation scheme for Long-Term Evolution network., and . Int. J. Commun. Syst., 27 (12): 3805-3821 (2014)Analysis of Spectrum Utilization of Cognitive Radio Networks in Nakagami Fading Channels., , and . VTC Fall, page 1-5. IEEE, (2015)