Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A* -based layout design for gratings allocation., and . Comput. Aided Des., 40 (4): 455-464 (2008)A fuzzy-based interleaved multi-hop authentication scheme in wireless sensor networks., and . J. Parallel Distributed Comput., 69 (5): 441-450 (2009)Simulation Methodology-Based Context-Aware Architecture Design for Behavior Monitoring of Systems.. Symmetry, 12 (9): 1568 (2020)A fuzzy rule-based path configuration method for LEAP in sensor networks., and . Ad Hoc Networks, (2015)A Network Density-adaptive Improved CCEF Scheme for Enhanced Network Lifetime, Energy Efficiency, and Filtering in WSNs., and . Ad Hoc Sens. Wirel. Networks, 35 (1-2): 129-149 (2017)PKSM: Pre-key Distribution and Sink Mobility in Commutative Cipher Based En-route Filtering to Extend the Network Lifetime in WSNs., and . Ad Hoc Sens. Wirel. Networks, 42 (1-2): 19-33 (2018)Extending the network lifetime by pre-deterministic key distribution in CCEF in wireless sensor networks., and . Wirel. Networks, 21 (8): 2799-2809 (2015)Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor Networks., and . ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 573-583. Springer, (2007)Simulation Modeling with Hierarchical Planning: Application to a Metal Manufacturing System., and . AIS, volume 3397 of Lecture Notes in Computer Science, page 71-80. Springer, (2004)Hierarchical Simulation Model with Animation for Large Network Security., and . ICICS, volume 2229 of Lecture Notes in Computer Science, page 456-460. Springer, (2001)