Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Coalitional Game-Theoretic Approach for QoS-Based and Secure Data Storage in Cloud Environment., , , and . HPCC/CSS/ICESS, page 1048-1054. IEEE, (2014)Adaptive Anonymous Authentication for Wearable Sensors in Wireless Body Area Networks., , , , and . IWCMC, page 606-611. IEEE, (2018)A stochastic game for adaptive security in constrained wireless body area networks., , , , and . CCNC, page 1-7. IEEE, (2018)Mobility and traffic models for reconfigurable networks of 3rd and 4th generations., , , and . ICECS, page 1-4. IEEE, (2005)Real Time Anomaly detection-Based QoE Feature selection and Ensemble Learning for HTTP Video Services., , and . ICTA, page 1-6. IEEE, (2019)Enhancing QoE Based on Machine Learning and DASH in SDN Networks., , and . AINA Workshops, page 258-263. IEEE Computer Society, (2018)How to use MEC and ML to Improve Resources Allocation in SDN Networks?, , , and . AINA Workshops, page 442-447. IEEE Computer Society, (2018)A Comparative Study on Game Theoretic Approaches for Resource Allocation in Cloud Computing Architectures., , , and . WETICE, page 336-341. IEEE Computer Society, (2013)A Fair Resource Allocation Approach in Cloud Computing Environments., , , and . WETICE, page 54-57. IEEE Computer Society, (2018)Bringing intelligence to Edge/Fog in Internet of Things-based healthcare applications: Machine learning/deep learning-based use cases., and . Int. J. Commun. Syst., (2023)