Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems., , , and . Wireless Personal Communications, 68 (4): 1943-1959 (2013)An Encryption Algorithm to Prevent Domain Name System Cache Poisoning Attacks., , and . ITNAC, page 1-6. IEEE, (2019)Detecting IRC-based Botnets by Network Traffic Analysis Through Machine Learning., , and . ITNAC, page 1-6. IEEE, (2019)A QoS Oriented Vertical Handoff Scheme for WiMAX/WLAN Overlay Networks., and . IEEE Trans. Parallel Distributed Syst., 23 (4): 598-606 (2012)Intelligent Image Recognition System for Marine Fouling Using Softmax Transfer Learning and Deep Convolutional Neural Networks., , , and . Complex., (2017)A Certificateless Authentication Protocol for D2D Group Communications in 5G Cellular Networks., , and . GLOBECOM, page 1-7. IEEE, (2019)Proactive load balancing with admission control for heterogeneous overlay networks., and . Wirel. Commun. Mob. Comput., 13 (18): 1671-1680 (2013)An Anonymous Handover Authentication Scheme Based on LTE-A for Vehicular Networks., , , and . Wirel. Commun. Mob. Comput., (2018)Adaptive fuzzy multiple attribute decision routing in VANETs., , , and . Int. J. Commun. Syst., (2017)ATCFS: Effective Connectivity Restoration Scheme for Underwater Acoustic Sensor Networks., , , , , and . IEEE Access, (2019)