Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust-Based Classification in Community Policing: A Systematic Review., , , and . ISTAS, page 1-8. IEEE, (2023)Exploring the Efficiencies and Vulnerabilities of Smart Door Control Systems: A Systematic Review., , , , , , , and . NEW2AN/ruSMART (1), volume 14542 of Lecture Notes in Computer Science, page 98-110. Springer, (2023)Realizing Efficient Security and Privacy in IoT Networks., , , , , and . Sensors, 20 (9): 2609 (2020)An ACO-KMT Energy Efficient Routing Scheme for Sensed-IoT Network., , , , and . IECON, page 3841-3846. IEEE, (2018)Efficient Switched Digital Beamforming Radar System based on SIMO/MIMO Receiver., , , and . ComComAP, page 411-416. IEEE, (2019)SDN-based Port Hopping Technique for Mitigating Network Attacks., , , , , and . SoftCOM, page 1-6. IEEE, (2023)Performance Analysis of D2D Energy Efficient IoT Networks with Relay-Assisted Underlaying Technique., , , and . IECON, page 3864-3869. IEEE, (2018)Blockchain-Enabled Technique for Privacy- Preserved Medical Recommender System., , , , and . IEEE Access, (2023)A Clustering Approach Based on Genetic Algorithm for Wireless Sensor Network Localization., , , and . CIS, page 54-58. IEEE, (2019)