From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks., , , и . Secur. Commun. Networks, 7 (8): 1292-1309 (2014)Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review., , и . J. Comput. Networks Commun., (2019)Buffer Tuning Mechanism for Stripped Transport Layer Connections Using PID Controller on Multi-homed Mobile Host., и . ICCSA (1), том 5072 из Lecture Notes in Computer Science, стр. 948-959. Springer, (2008)An adaptive resource management for mobile terminals on vertical handoff., и . Ann. des Télécommunications, 63 (7-8): 435-447 (2008)MUQAMI: A Locally Distributed Key Management Scheme for Clustered Sensor Networks., , , , , и . IFIPTM, том 238 из IFIP, стр. 333-348. Springer, (2007)Adaptive Vertical Handoff Management Architecture., и . International Conference on Computational Science (4), том 4490 из Lecture Notes in Computer Science, стр. 582-585. Springer, (2007)Hybrid Intrusion Detection System for Wireless Sensor Networks., , и . ICCSA (2), том 4706 из Lecture Notes in Computer Science, стр. 383-396. Springer, (2007)TCP Adaptation for Vertical Handoff Using Network Monitoring., и . International Conference on Computational Science (4), том 4490 из Lecture Notes in Computer Science, стр. 498-505. Springer, (2007)An Efficient Re-keying Scheme for Cluster Based Wireless Sensor Networks., , , , и . ICCSA (2), том 4706 из Lecture Notes in Computer Science, стр. 1028-1037. Springer, (2007)Q-learning based adaptive subgraph generation algorithm for graph routing in ISA 100.11a., и . ICTC, стр. 1099-1101. IEEE, (2013)