From post

Fuzzy-Based Protocol for Secure Remote Diagnosis of IoT Devices in 5G Networks.

, , , , и . IoTaaS, том 246 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 54-63. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MIST 2016: 8th International Workshop on Managing Insider Security Threats., и . ACM Conference on Computer and Communications Security, стр. 1890-1891. ACM, (2016)Computational Offloading for Efficient Trust Management in Pervasive Online Social Networks Using Osmotic Computing., , , и . IEEE Access, (2017)Efficient Computation Offloading in Edge Computing Enabled Smart Home., , , и . IEEE Access, (2021)Next generation mobility management., , , и . Wirel. Commun. Mob. Comput., 11 (4): 443-445 (2011)Identifying Windows Installer Package Files for Detection of Pirated Software., , , , , и . IMIS, стр. 287-290. IEEE Computer Society, (2014)5G and beyond telco cloud: architecture and cybersecurity challenges., , , , , и . WAC, стр. 1-6. IEEE, (2021)Extension of MIH for FPMIPv6 (EMIH-FPMIPv6) to support optimized heterogeneous handover., , , , и . Future Gener. Comput. Syst., (2019)Balanced bipartite graph based register allocation for network processors in mobile and wireless networks., , , , и . Mob. Inf. Syst., 6 (1): 65-83 (2010)Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process., , и . Mob. Inf. Syst., (2020)Improvised Model for Blockchain in Distributed Cloud Environment., , , , , и . CSS, том 13547 из Lecture Notes in Computer Science, стр. 327-341. Springer, (2022)