Author of the publication

Prediction-Based Mobile Data Offloading in Mobile Cloud Computing.

, , and . IEEE Trans. Wirel. Commun., 17 (7): 4660-4673 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FuzzyCCG: a fuzzy logic QoS approach for congestiosn control in wireless ad hoc networks., and . Q2SWinet, page 105-111. ACM, (2005)A Fuzzy Petri Nets QoS Model for Wireless AD Hoc Networks., and . INTELLCOMM, volume 190 of IFIP, page 147-156. Springer, (2005)Toward Neural Networks Solution for Multimedia Support in Mobile Ad hoc Networks., and . J. Networks, 4 (2): 148-161 (2009)An efficient and fair congestion control protocol for IEEE 802.11-based Wireless Mesh Networks., , , and . PIMRC, page 738-744. IEEE, (2012)A study of the impact of merging schemes on cluster stability in VANETs., , , , and . PIMRC, page 1-7. IEEE, (2017)MiTFed: A Privacy Preserving Collaborative Network Attack Mitigation Framework Based on Federated Learning Using SDN and Blockchain., , and . IEEE Trans. Netw. Sci. Eng., 10 (4): 1985-2001 (July 2023)Towards a Secure and Reliable Federated Learning using Blockchain., , and . GLOBECOM, page 1-6. IEEE, (2021)A reputation system for detection of black hole attack in vehicular networking., , , , and . SSIC, page 1-5. IEEE, (2015)Mining classification algorithms to identify flooding attacks through the HTTP/3 protocol., , , and . ICC Workshops, page 1259-1264. IEEE, (2023)A Data Mining-based Intrusion Detection System for Cyber Physical Power Systems., , , and . Q2SWinet, page 55-62. ACM, (2022)