Author of the publication

Jamming Attack Model and Detection Method for Beacons Under Multichannel Operation in Vehicular Networks.

, and . IEEE Trans. Vehicular Technology, 66 (7): 6475-6488 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HA-A2L: angle to landmark-based high accuracy localization method in sensor networks., , and . IWCMC, page 475-480. ACM, (2007)A2L: Angle to Landmarks Based Method Positioning for Wireless Sensor Networks., , and . ICC, page 3301-3306. IEEE, (2007)Energy and mobility aware clustering technique for multicast routing protocols in wireless ad hoc networks., , and . WCNC, page 2150-2155. IEEE, (2009)Emergency Networks and Future Public Safety Systems., , and . Wirel. Commun. Mob. Comput., (2019)Impacts and solutions of control packets vulnerabilities with IEEE 802.11 MAC., and . Wirel. Commun. Mob. Comput., 9 (4): 469-488 (2009)Protocol Validation: A Parallel Technique to Reduce the Reachability Tree.. PARLE, volume 817 of Lecture Notes in Computer Science, page 109-121. Springer, (1994)On semantic clustering and adaptive robust regression based energy-aware communication with true outliers detection in WSN., , , and . Ad Hoc Networks, (2019)A Secure Mechanism Design-Based and Game Theoretical Model for MANETs., , , , and . Mob. Networks Appl., 15 (2): 191-204 (2010)A Secure and Efficient Wireless Charging Scheme for Electric Vehicles in Vehicular Energy Networks., , , , and . IEEE Trans. Veh. Technol., 71 (2): 1491-1508 (2022)Robust Enhancement of Intrusion Detection Systems Using Deep Reinforcement Learning and Stochastic Game., , , , and . IEEE Trans. Veh. Technol., 71 (10): 11089-11102 (2022)