Author of the publication

Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis.

, , and . J. Comput. Sci. Technol., 23 (3): 389-399 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An entropy-based model for supporting and evaluating route stability in mobile ad hoc wireless networks., and . IEEE Communications Letters, 6 (8): 328-330 (2002)A continuum theory-based approach to the modeling of dynamic wireless sensor networks., and . IEEE Communications Letters, 9 (4): 337-339 (2005)Intelligent Flow-Based Sampling for Effective Network Anomaly Detection., and . GLOBECOM, page 1948-1953. IEEE, (2007)Utility Based Short-term Throughput Driven Scheduling Approach for Efficient Resource Allocation in CDMA Wireless Networks., and . Wireless Personal Communications, 52 (3): 517-535 (2010)User Optimal Throughput-Delay Trade-off in Multihop Networks Under NUM Framework., and . IEEE Communications Letters, 18 (11): 1999-2002 (2014)Temporal Dynamics of Information Diffusion in Twitter: Modeling and Experimentation., , , and . IEEE Trans. Comput. Social Systems, 5 (1): 256-264 (2018)On the Risk-Based Operation of Mobile Attacks in Wireless Ad Hoc Networks., , and . ICC, page 1130-1135. IEEE, (2007)Modeling and analysis of the position-guided sliding-window routing protocol., and . ICC, page 1680-1684. IEEE, (2003)Hierarchical Anomaly Detection in Distributed Large-Scale Sensor Networks., , , and . ISCC, page 761-767. IEEE Computer Society, (2006)A network fault diagnostic approach based on a statistical traffic normality prediction algorithm., and . GLOBECOM, page 2918-2922. IEEE, (2003)