Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fair access mechanism based on TXOP in IEEE 802.11e wireless networks., , , and . Int. J. Commun. Networks Inf. Secur., (2016)A new data aggregation approach for WSNs based on open pits mining., , and . Wirel. Networks, 27 (1): 41-53 (2021)A smart adaptive particle swarm optimization-support vector machine: android botnet detection application., , , and . J. Supercomput., 76 (12): 9854-9881 (2020)A new method for assigning appropriate labels to create a 28 Standard Android Botnet Dataset (28-SABD)., and . J. Ambient Intell. Humaniz. Comput., 10 (11): 4579-4593 (2019)GCW: A Game Theoretic Contention Window Adjustment Approach for IEEE 802.11 WLANs., , and . Wireless Personal Communications, 83 (2): 1101-1130 (2015)Utilizing Non-Orthogonal Multiple Access for Both Latency and Energy Efficiency Improvement in TSCH-Based WSNs., , , and . IEEE Access, (2022)A Game Theory based Contention Window Adjustment for IEEE 802.11 under Heavy Load., , and . Int. J. Commun. Networks Inf. Secur., (2013)Carrier Sense Multiple Access Tuning Parameters using Game Theory, , and . CoRR, (2012)A modified method for image encryption based on chaotic map and genetic algorithm., , and . Multim. Tools Appl., 79 (37-38): 26927-26950 (2020)Game Theory Applications in CSMA Methods., , , and . IEEE Commun. Surv. Tutorials, 15 (3): 1062-1087 (2013)