Author of the publication

Trust Trackers for Computation Offloading in Edge-Based IoT Networks.

, , and . INFOCOM, page 1-10. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ThreatPro: Multi-Layer Threat Analysis in the Cloud., , , and . CoRR, (2022)Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things., , , , , and . ACM Trans. Sens. Networks, 18 (2): 29:1-29:41 (2022)Throughput Aware Authentication Prioritisation for Vehicular Communication Networks., , , and . VTC Fall, page 1-5. IEEE, (2019)Privacy Challenges With Protecting Live Vehicular Location Context., , , , and . IEEE Access, (2020)Near optimal routing protocols for source location privacy in wireless sensor networks: modelling, design and evaluation.. University of Warwick, Coventry, UK, (2018)British Library, EThOS.Into the Heat of the Debate: Simulating a Program Committee Within Computer Science Education., , and . EDUCON, page 1-5. IEEE, (2023)The impact of decreasing transmit power levels on FlockLab to achieve a sparse network., , and . Bench@CPSIoTWeek, page 7-12. ACM, (2019)Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony Optimisation., , and . EDCC, page 111-118. IEEE, (2019)Trust Trackers for Computation Offloading in Edge-Based IoT Networks., , and . INFOCOM, page 1-10. IEEE, (2021)Poster: Multi-Layer Threat Analysis of the Cloud., , , and . CCS, page 3419-3421. ACM, (2022)