Author of the publication

A Secure Spectrum Handoff Mechanism in Cognitive Radio Networks.

, , , , and . IEEE Trans. Cogn. Commun. Netw., 6 (3): 959-969 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social Characteristic-Based Propagation-Efficient PBFT Protocol to Broadcast in Unstructured Overlay Networks., , , , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 3621-3639 (2022)Interpreting Universal Adversarial Example Attacks on Image Classification Models., , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 3392-3407 (July 2023)Ubuntu One investigation: Detecting evidences on client machines., , , and . The Cloud Security Ecosystem, Elsevier, (2015)International Workshop on Privacy, Security and Trust in Computational Intelligence (PSTCI2021)., , , , , and . CIKM, page 4886-4887. ACM, (2021)Investigating formation of Collective Identity driving the Black Lives Matter movement during COVID-19., , and . AMCIS, Association for Information Systems, (2021)A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering., , , , and . SecureComm, volume 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 649-664. Springer, (2015)The cyber threat landscape: Challenges and future research directions. Computers & Security, 30 (8): 719 - 731 (2011)Understanding the Information Security Awareness Process in Real Estate Organizations Using the SECI Model., , and . AMCIS, Association for Information Systems, (2014)A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management., , , and . TrustCom/BigDataSE/ISPA (1), page 1073-1080. IEEE, (2015)Android Cache Taxonomy and Forensic Process., , and . TrustCom/BigDataSE/ISPA (1), page 1094-1101. IEEE, (2015)