Author of the publication

A Survey on Cyber Security Threats in IoT-Enabled Maritime Industry.

, , , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (2): 2677-2690 (February 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitating aromatase in the human brain with PET and N-methyl-11Cvorozole(11CVOR)., , , , and . NeuroImage, 52 (Supplement-1): S114 (2010)LTE or LAA: Choosing Network Mode for My Mobile Phone in 5G Network., , , and . VTC Spring, page 1-4. IEEE, (2017)Throughput Enhancement in Cooperative Wireless Ad Hoc Networks., , and . HPCC/CSS/ICESS, page 1177-1180. IEEE, (2014)SNR-based relay selection in cooperative wireless ad hoc networks., , , and . Int. J. Ad Hoc Ubiquitous Comput., 28 (1): 45-54 (2018)Opportunistic Packet Scheduling over IEEE 802.11 WLAN.. UIC, volume 4159 of Lecture Notes in Computer Science, page 399-408. Springer, (2006)Reliable Multicast MAC Protocol for Wireless Ad Hoc Networks., and . UIC, volume 4611 of Lecture Notes in Computer Science, page 276-284. Springer, (2007)Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends., , and . Sensors, 13 (9): 11196-11228 (2013)Performance analysis of forward error correcting codes in IPTV., , , and . IEEE Trans. Consumer Electron., 54 (2): 376-380 (2008)Opportunistic Scheduling with Statistical Fairness Guarantee in Wireless Networks., , , , and . PIMRC, page 1-5. IEEE, (2007)An analysis of channel access delay in synchronized MAC protocol for cognitive radio networks., , and . Trans. Emerg. Telecommun. Technol., 25 (5): 485-489 (2014)