Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HIP_IKEv2: A Proposal to Improve Internet Key Exchange Protocol-based on Host Identity Protocol., , , , and . SIMULTECH, page 404-411. SciTePress, (2013)Improved Secure Neighbor Discovery Protocol (ISEND) for New Wireless Networks Generations., , , , and . WINSYS, page 71-77. SciTePress, (2014)A Distributed Access Control Scheme based on Risk and Trust for Fog-cloud Environments., , , , and . ICETE (1), page 462-468. SciTePress, (2018)HITH: Hybrid IP Traceback for Heterogeneous Wireless Networks., , , , and . WINSYS, page 84-93. SciTePress, (2016)Interference Mitigation based on NOMA for Scheduling Algorithm in V2X Environments., , , and . IWCMC, page 1952-1957. IEEE, (2020)Genetic Algorithm based Resource Allocation for V2X Communications., , and . COMNET, page 1-5. IEEE, (2020)Transfer learning-based Mirai botnet detection in IoT networks., , and . INISTA, page 1-5. IEEE, (2023)C-DIDS: A Cooperative and Distributed Intrusion Detection System in Cloud environment., , and . IWCMC, page 267-272. IEEE, (2018)QTc-Based Machine Learning Analysis of COVID-19 and Post-COVID-19 Patients., , , , and . WETICE, page 1-6. IEEE, (2023)Distributed Firewall and Controller for Mobile Cloud Computing., , and . AICCSA, page 1-9. IEEE Computer Society, (2018)