Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions., , , , and . CoRR, (2019)Secure topology maintenance and events collection in WSNs., , , and . Secur. Commun. Networks, 4 (7): 744-762 (2011)Towards privacy preserving unstructured big data publishing., , , and . J. Intell. Fuzzy Syst., 36 (4): 3471-3482 (2019)Dynamic Super Round-Based Distributed Task Scheduling for UAV Networks., , and . IEEE Trans. Wirel. Commun., 22 (2): 1014-1028 (2023)Privacy-Preserving and Security in SDN-Based IoT: A Survey., , , , and . IEEE Access, (2023)Advertising in the IoT Era: Vision and Challenges., , , , and . IEEE Commun. Mag., 56 (11): 138-144 (2018)Security and design requirements for software-defined VANETs., , and . Comput. Networks, (2020)You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality., , , , and . CoRR, (2022)BitProb: Probabilistic Bit Signatures for Accurate Application Identification., , and . IEEE Trans. Netw. Serv. Manag., 17 (3): 1730-1741 (2020)The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems., , and . IEEE Trans. Netw. Serv. Manag., 19 (4): 5152-5169 (December 2022)