Author of the publication

SAN: Self-Adaptive Navigation for Drone Battery Charging in Wireless Drone Networks.

, , , , , and . AINA Workshops, page 248-251. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A framework for DNS naming services for Internet-of-Things devices., , , , , and . Future Generation Comp. Syst., (2019)No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games., , , and . WWW, page 1825-1834. ACM, (2018)I'm Listening to your Location! Inferring User Location with Acoustic Side Channels., , , , , and . WWW, page 339-348. ACM, (2018)A Perfect Collision-Free Pseudonym System., and . IEEE Communications Letters, 15 (6): 686-688 (2011)80% of Block Propagation Rate is Enough - Towards Secure and Efficient PoW-based Blockchain Consensus., , , and . MobiSys, page 639-640. ACM, (2019)I've Got Your Number: - Harvesting Users' Personal Data via Contacts Sync for the KakaoTalk Messenger., , , and . WISA, volume 8909 of Lecture Notes in Computer Science, page 55-67. Springer, (2014)I'm too Busy to Reset my LinkedIn Password: On the Effectiveness of Password Reset Emails., , , , and . CHI, page 387-391. ACM, (2017)A Framework for Managing User-defined Security Policies to Support Network Security Functions., , , , and . IMCOM, page 85:1-85:8. ACM, (2018)Preventing DNS Amplification Attacks Using the History of DNS Queries with SDN., , , , , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 135-152. Springer, (2017)Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices., , , and . J. Internet Serv. Inf. Secur., 7 (4): 35-44 (2017)