Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Porambage, Pawani
add a person with the name Porambage, Pawani
 

Other publications of authors with the same name

Secure Keying Scheme for Network Slicing in 5G Architecture., , , , and . CSCN, page 1-6. IEEE, (2019)Proof-of-Monitoring (PoM): A Novel Consensus Mechanism for Blockchain-Based Secure Service Level Agreement Management., , , , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 2783-2803 (September 2023)Lightweight Dew Computing Paradigm to Manage Heterogeneous Wireless Sensor Networks with UAVs., , , , , and . CoRR, (2018)Managing Mobile Relays for Secure E2E Connectivity of Low-Power IoT Devices., , , , and . CCNC, page 1-7. IEEE, (2019)Robust Aggregation Technique Against Poisoning Attacks in Multi-Stage Federated Learning Applications., , , , and . CCNC, page 956-962. IEEE, (2024)AI and 6G Security: Opportunities and Challenges., , , and . EuCNC/6G Summit, page 616-621. IEEE, (2021)Robust and Resilient Federated Learning for Securing Future Networks., , , and . EuCNC, page 351-356. IEEE, (2022)6G Security Challenges and Potential Solutions., , , , and . EuCNC/6G Summit, page 622-627. IEEE, (2021)Federated Learning based Anomaly Detection as an Enabler for Securing Network and Service Management Automation in Beyond 5G Networks., , , , and . EuCNC, page 345-350. IEEE, (2022)Design Methodology for 6G End-to-End System: Hexa-X-II Perspective., , , , , , , , , and 17 other author(s). IEEE Open J. Commun. Soc., (2024)