Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

In-band LOS discovery using highly directional transceivers., , , and . Ad Hoc Networks, (2019)Enhancement of spectrum utilization in non-contiguous DSA with online defragmentation., , and . MILCOM, page 432-437. IEEE, (2015)Route Aware Dynamic Channel Scheduling and Selection for Multi-Hop Cognitive Radio Networks., , and . VTC Fall, page 1-5. IEEE, (2013)Performance analysis of CR-honeynet to prevent jamming attack through stochastic modeling., , and . Pervasive Mob. Comput., (2015)Neighbor Discovery in a LoRa Assisted Multi-Transceiver Free-Space-Optical Network., , , , and . WCNC, page 2703-2708. IEEE, (2022)Exploring the CAM4 Data Breach: Security Vulnerabilities and Response Strategies., , , , , and . CCGridW, page 174-179. IEEE, (2024)Promoting Inclusiveness and Fairness through NFTs: The Case of Student-Athletes and NILs., , , , and . CHI, page 176:1-176:9. ACM, (2023)Machine Learning-based Irrigation Control Optimization., , , , , and . BuildSys@SenSys, page 213-222. ACM, (2019)EdgeKeeper: resilient and lightweight coordination for mobile edge computing systems., , , , , , , and . MobiSys, page 577-578. ACM, (2022)Vulnerability in Massive API Scraping: 2021 LinkedIn Data Breach., , , and . CSCI, page 777-782. IEEE, (2021)