Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attack-Resilient TLS Certificate Transparency., , , , , and . IEEE Access, (2020)Safety Analysis of Automatic Train Operation Based on ETCS., , , and . RSSRail, volume 14198 of Lecture Notes in Computer Science, page 43-61. Springer, (2023)Economic Dispatch for Conventional Generation-Replacement with Solar PV and Battery Storage Using Robust Stochastic Optimization., , and . ICCAD, page 1-6. IEEE, (2023)Biologically Inspired Algorithm for Adaptive Convergence in Multi-Agent System., , , , and . ICCAD, page 1-5. IEEE, (2023)How do startups develop internet-of-things systems: a multiple exploratory case study., , , , , and . ICSSP, page 74-83. IEEE / ACM, (2019)Self-Supervised Path Planning in UAV-Aided Wireless Networks Based on Active Inference., , , , and . ICASSP, page 13181-13185. IEEE, (2024)Ontology Driven Course Contents Selection and Scheduling Using Multi-Agent System., and . CSREA EEE, page 205-211. CSREA Press, (2008)Pilot contamination mitigation under smart pilot allocation strategies within massive MIMO-5G system., , , , and . Phys. Commun., (2021)Psychological profiling of hackers via machine learning toward sustainable cybersecurity., , , , and . Frontiers Comput. Sci., (2024)An Investigation of Exhaust Gas Temperature of Aircraft Engine Using LSTM., , , , , and . IEEE Access, (2023)