Author of the publication

Evaluating Hamming Distance as a Metric for the Detection of CRC-based Side-channel Communications in MANETs.

, , and . ANT/SEIT, volume 83 of Procedia Computer Science, page 433-440. Elsevier, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using a Blackboard to Integrate Multiple Activities and Achieve Strategic Reasoning for Mobile-Robot Navigation., , , , and . IEEE Expert, 10 (2): 24-36 (1995)Integrating Access Control Obligations in the Session Initiation Protocol for Pervasive Computing Environments., and . MCETECH, volume 289 of Lecture Notes in Business Information Processing, page 24-40. (2017)Inside out - A study of users' perceptions of password memorability and recall., , , , , and . J. Inf. Secur. Appl., (2019)Differential Evolution Optimization of TSCH Scheduling for Heterogeneous Sensor Networks., and . WCNC, page 1491-1496. IEEE, (2022)A Microservice-Based Architecture for Performance and Energy Benchmarking of Docker-Host Linux Distributions on Internet-of-Things Devices., , and . ICIT, page 705-711. IEEE, (2021)What Your Brain Says About Your Password: Using Brain-Computer Interfaces to Predict Password Memorability., , , , , and . PST, page 127-136. IEEE Computer Society, (2017)Performance Measurement of XML Compression Algorithms for DSRC Messages., , and . LCN, page 677-684. IEEE Computer Society, (2007)A frame handler module for a side-channel in mobile ad hoc networks., , , , , and . LCN, page 930-936. IEEE Computer Society, (2009)Enhancing Collection Tree Protocol for Mobile Wireless Sensor Networks., , and . EUSPN/ICTH, volume 21 of Procedia Computer Science, page 416-423. Elsevier, (2013)A Comparison of Real-Time Obstacle Avoidance Methods for Mobile Robots., , and . ISER, volume 190 of Lecture Notes in Control and Information Sciences, page 301-316. Springer, (1991)