Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new analysis of the cognitive radio jump-stay algorithm under the asymmetric model., , , and . ICC, page 1590-1595. IEEE, (2014)Location-free link state routing for underwater acoustic sensor networks., , , , and . CCECE, page 1544-1549. IEEE, (2015)The Bidirectional Algorithm for Channel Selection Using a Two-Radio Model., , , and . VTC Fall, page 1-5. IEEE, (2014)QoS and security in Link State Routing protocols for MANETs., , , and . Wireless Days, page 1-6. IEEE, (2013)A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs., , , and . J. Netw. Comput. Appl., 36 (2): 744-755 (2013)Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks., , , and . CNSR, page 167-174. IEEE Computer Society, (2011)A new analytic model for the cognitive radio jump-stay algorithm., , , and . Wireless Days, page 1-3. IEEE, (2013)Revisiting the Performance of the Modular Clock Algorithm for Distributed Blind Rendezvous in Cognitive Radio Networks., , , and . ADHOC-NOW, volume 8487 of Lecture Notes in Computer Science, page 197-208. Springer, (2014)Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol., , , and . FPS, volume 6888 of Lecture Notes in Computer Science, page 118-131. Springer, (2011)Channel selection using a multiple radio model., , , and . J. Netw. Comput. Appl., (2016)