Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collective computer incident response using cognitive maps., , and . SMC (1), page 1080-1085. IEEE, (2004)All-optical Multi-wavelength Virtual Memory Architecture - Design and Performances Analysis., , and . DCNET/ICE-B/OPTICS, page 388-395. SciTePress, (2012)A Novel Graph-Based Approach for the Management of Health Data on Cloud-Based WSANs., , and . J. Grid Comput., 16 (2): 317-344 (2018)A hole detection scheme based on polygonal cycles for the irregular radio range in WSN., , and . MOBIWAC, page 31-38. ACM, (2014)Location Management in Wireless Fourth Generation Networks., , and . GLOBECOM, page 4984-4988. IEEE, (2007)DigForNet: Digital Forensic in Networking., , and . SEC, volume 278 of IFIP, page 637-651. Springer, (2008)A Temporal Logic-Based Model for Forensic Investigation in Networked System Security., and . MMM-ACNS, volume 3685 of Lecture Notes in Computer Science, page 325-338. Springer, (2005)A location-aware authentication and key management scheme for wireless sensor networks., and . APCC, page 488-495. IEEE, (2016)Intrusion tolerant QoS provision in mobile multihop relay networks., and . EURASIP J. Wireless Comm. and Networking, (2013)An Agreement Graph-Based-Authentication Scheme for 5G Networks., and . UNet, volume 10542 of Lecture Notes in Computer Science, page 509-520. Springer, (2017)