Author of the publication

RPL-Based Tree Construction Scheme for Target-Specific Code Dissemination in Wireless Sensors Networks.

, , , , and . IEICE Trans. Commun., 103-B (3): 190-199 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Asahina, Hiromu
add a person with the name Asahina, Hiromu
 

Other publications of authors with the same name

Encounter Record Reduction Scheme based on Theoretical Contact Probability for Flooding Attack Mitigation in DTN., , , and . APCC, page 34-39. IEEE, (2018)RPL-Based Tree Construction Scheme for Target-Specific Code Dissemination in Wireless Sensors Networks., , , , and . IEICE Trans. Commun., 103-B (3): 190-199 (2020)Indoor Crowd Estimation Scheme Using the Number of Wi-Fi Probe Requests under MAC Address Randomization., , , and . IEICE Trans. Inf. Syst., 104-D (9): 1420-1426 (2021)A Scheduling Scheme for Autonomous Vehicle Highway Merging With an Outflow Traffic and Fairness Analysis., , , and . IEEE Access, (2021)Path metrics for lower throughput fluctuation for video streaming service in wireless mesh networks., , , and . APCC, page 539-543. IEEE, (2015)Visual Similarity-Based Phishing Detection Scheme Using Image and CSS with Target Website Finder., , and . GLOBECOM, page 1-6. IEEE, (2017)A Scheduling Scheme for Cooperative Merging at a Highway On-Ramp with Maximizing Average Speed of Automated Vehicles., , , and . VTC Fall, page 1-5. IEEE, (2020)An Energy Efficient Target Specific Code Dissemination Scheme with Forwarder Selection Algorithm in WSNs., , , , and . PIMRC, page 1-6. IEEE, (2018)Hue Signature Auto Update System for Visual Similarity-Based Phishing Detection with Tolerance to Zero-Day Attack., , , and . IEICE Trans. Inf. Syst., 102-D (12): 2461-2471 (2019)Traceroute-based target link flooding attack detection scheme by analyzing hop count to the destination., , , and . APCC, page 1-6. IEEE, (2017)