Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Execution of A Requirement Model in Software Development., , , , and . IASSE, page 203-208. ISCA, (2004)Enabling Smart Cloud Services Through Remote Sensing: An Internet of Everything Enabler., , , and . IEEE Internet of Things Journal, 1 (3): 276-288 (2014)Design of ATM Switch Architectures using Optical Systems., and . PDPTA, page 2463-2469. CSREA Press, (1999)Secure and Reliable Resource Allocation and Caching in Aerial-Terrestrial Cloud Networks (ATCNs)., , , and . IEEE Access, (2019)LRCoin: Leakage-resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT., , , , , and . CoRR, (2018)Failure Prediction Based on Multi-Scale Frequent Anomalous Behavior Identification in Support of Autonomic Networks., , , and . GLOBECOM, page 1-5. IEEE, (2010)Social interaction increases capacity of wireless networks., , and . IWCMC, page 467-472. IEEE, (2013)IEEE Access Special Section Editorial: Mobile Edge Computing and Mobile Cloud Computing: Addressing Heterogeneity and Energy Issues of Compute and Network Resources., , , , , , and . IEEE Access, (2020)A Survey of Cyber-Physical Attacks and Detection Methods in Smart Water Distribution Systems., , , and . IEEE Access, (2021)RANCE: A Randomly Centralized and On-Demand Clustering Protocol for Mobile Ad Hoc Networks., , , , , and . IEEE Internet Things J., 9 (23): 23639-23658 (2022)