Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ThreatPro: Multi-Layer Threat Analysis in the Cloud., , , and . CoRR, (2022)Throughput Aware Authentication Prioritisation for Vehicular Communication Networks., , , and . VTC Fall, page 1-5. IEEE, (2019)Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things., , , , , and . ACM Trans. Sens. Networks, 18 (2): 29:1-29:41 (2022)Privacy Challenges With Protecting Live Vehicular Location Context., , , , and . IEEE Access, (2020)Near optimal routing protocols for source location privacy in wireless sensor networks: modelling, design and evaluation.. University of Warwick, Coventry, UK, (2018)British Library, EThOS.Into the Heat of the Debate: Simulating a Program Committee Within Computer Science Education., , and . EDUCON, page 1-5. IEEE, (2023)The impact of decreasing transmit power levels on FlockLab to achieve a sparse network., , and . Bench@CPSIoTWeek, page 7-12. ACM, (2019)Trust Trackers for Computation Offloading in Edge-Based IoT Networks., , and . INFOCOM, page 1-10. IEEE, (2021)Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony Optimisation., , and . EDCC, page 111-118. IEEE, (2019)Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud., , , and . CCS, page 3415-3417. ACM, (2022)