Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security threats in M2M networks: a survey with case study., , , , and . Comput. Syst. Sci. Eng., (2017)Multi-Band Multi-Hop WLANs for Disaster Relief and Public Safety Applications., , , , and . WCNC Workshops, page 1-6. IEEE, (2020)Adaptive Switching for Efficient Energy Harvesting in Energy Constraint IoT Devices., , and . VTC Fall, page 1-5. IEEE, (2017)A Novel TCP/IP Header Hijacking Attack on SDN., , , , , , and . INFOCOM Workshops, page 1-2. IEEE, (2022)A new alarming system for an underground mining environment using visible light communications., , and . IHTC, page 213-217. IEEE, (2017)Feasibility of a Post-Auricle Wireless Power System for Pediatric Mechanical Circulatory Support Pumps., , , and . EMBC, page 1514-1517. IEEE, (2018)A Comparative Analysis of Task Scheduling Approaches in Cloud Computing., , , , , , , and . CCGRID, page 681-684. IEEE, (2020)A Comparative Analysis of Distributed Ledger Technologies for Smart Contract Development., , , , , , and . PIMRC, page 1-6. IEEE, (2019)Machine Learning in IoT Security: Current Solutions and Future Challenges., , , and . CoRR, (2019)Performance Analysis of Two Dimensional Spreading for OFCDM Femtocell Users Overlaid with OFDM Macrocell., , and . Wirel. Pers. Commun., 72 (1): 137-158 (2013)