Author of the publication

Survey of sensor selection methods in wireless sensor networks.

, and . ICON, page 1-5. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Specific primary user sensing for wireless security in IEEE 802.22 network., , , , and . ISCIT, page 18-22. IEEE, (2011)Energy-based target localization in multi-hop wireless sensor networks., and . RWS, page 243-246. IEEE, (2012)An Indoor Wi-Fi Positioning Approach optimized by Virtual Node., , and . ICCCS, page 609-612. IEEE, (2020)An OWL-Based Approach for RBAC with Negative Authorization., , , , and . KSEM, volume 4092 of Lecture Notes in Computer Science, page 164-175. Springer, (2006)A Flexible Applicable RBAC Model and Its Administration., , and . DEXA Workshops, page 192-196. IEEE Computer Society, (2007)An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems., , and . Secur. Commun. Networks, 9 (10): 1146-1157 (2016)Big Data Processing Architecture for Radio Signals Empowered by Deep Learning: Concept, Experiment, Applications and Challenges., , , , , , and . IEEE Access, (2018)A Parameter-Irrelevant Range-Based Normalized Wireless Positioning Algorithm., , and . ISCID (2), page 315-319. IEEE, (2018)Survey of sensor selection methods in wireless sensor networks., and . ICON, page 1-5. IEEE, (2013)An Authentication Framework for Multi-Domain Machine-to-Machine Communication in Cyber-Physical Systems., , and . GLOBECOM Workshops, page 1-6. IEEE, (2015)