Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Utilizing Locality of Demand for Lower Response Times in Underwater Data Broadcasting., , , , and . VTC Spring, page 1-5. IEEE, (2011)The effect of group mobility on the efficacy of routing in next generation mobile networks., , and . ICT, page 1-5. IEEE, (2016)Analysing indirect Sybil attacks in randomly deployed Wireless Sensor Networks., , and . PIMRC, page 1-6. IEEE, (2016)VisIoT: A threat visualisation tool for IoT systems security., , and . ICC Workshops, page 2633-2638. IEEE, (2015)A Reinforcement learning-based cognitive MAC protocol., , , , and . ICC, page 5608-5613. IEEE, (2015)An analytical framework of a C-RAN supporting random, quasi-random and bursty traffic., , , , and . Comput. Networks, (2020)SPEAR SIEM: A Security Information and Event Management system for the Smart Grid., , , , , , , , , and 7 other author(s). Comput. Networks, (2021)A survey on FANET routing from a cross-layer design perspective., , , , , and . J. Syst. Archit., (2021)Super Resolution for Augmented Reality Applications., , , , , , and . INFOCOM Workshops, page 1-6. IEEE, (2022)A Hybrid RF-FSO Offloading Scheme for Autonomous Industrial Internet of Things., , , , , , and . INFOCOM Workshops, page 1-6. IEEE, (2022)