Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Context-aware Platform to Support Mobile Users with Personalized Services., , , , and . WINSYS, page 153-158. INSTICC Press, (2009)Context-based services discovery in mobile environments., , , and . ICT, page 13-18. IEEE, (2009)Evaluating Wi-Fi Security Through Wardriving: A Test-Case Analysis., , , , and . WINCOM, page 1-7. IEEE, (2023)Dynamic user profiling approach for services discovery in mobile environments., , , and . IWCMC, page 550-554. ACM, (2010)Genetic Algorithm to Solve Demand Side Management and Economic Dispatch Problem., , , , and . ANT/SEIT, volume 130 of Procedia Computer Science, page 611-618. Elsevier, (2018)Emerging wireless technologies in e-health trends, challenges, and framework design issues., , , , and . ICMCS, page 440-445. IEEE, (2012)Experimental Analysis of VoIP over Wireless Local Area Networks., and . J. Commun., 2 (4): 3-9 (2007)An efficient modular security plane AM-SecP for hybrid distributed SDN., , , , and . WiMob, page 354-359. IEEE, (2019)RFID Application to Airport Luggage Tracking as a Green Logistics Approach., , , , and . CIST, page 642-649. IEEE, (2018)Mobile phones security: the spread of malware via MMS and Bluetooth, prevention methods., , , and . MoMM, page 256-259. ACM, (2011)