Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Spectrum Sensing in Cognitive-Radio-Based Smart Grid Using Role-Based Delegation., , , and . ICIME, page 25-29. ACM, (2016)A Basic Course Model on Information Security for High School IT Curriculum., and . EDUCON, page 63-70. IEEE, (2019)Usage control for charging/discharging of plug-in electric vehicle (UConPEV)., , and . IWCMC, page 1693-1699. IEEE, (2017)A New Approach Based on a Multi-Agent System for IDS in Cloud Computing., , , , , , and . SDS, page 1-8. IEEE, (2022)SDN_Based Secure Healthcare Monitoring System(SDN-SHMS)., , and . ICCCN, page 1-7. IEEE, (2019)End-to-end security solutions for WLAN: a performance analysis for the underlying encryption algorithms in the lightweight devices., , and . IWCMC, page 1295-1300. ACM, (2006)A Secure Discharging Protocol for Plug in Electric Vehicle (SDP-V2G) in Smart Grid., , , and . ICT Innovations, volume 778 of Communications in Computer and Information Science, page 15-26. Springer, (2017)Securing Smart Meters Data for AMI Using RBAC., , and . AsiaJCIS, page 1-8. IEEE Computer Society, (2016)Framework for Agent-Based Role Delegation., and . ICC, page 1361-1367. IEEE, (2007)Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure., , , , , and . Trans. Emerg. Telecommun. Technol., (2022)