From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PHY foundation for multi-factor ZigBee node authentication., , и . GLOBECOM, стр. 795-800. IEEE, (2012)Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation., , , и . IEEE Trans. Dependable Secur. Comput., 12 (5): 585-596 (2015)An Analytical Black Hole Attack Model Using a Stochastic Topology Approximation Technique for Reactive Ad-Hoc Routing Protocols., , и . Int. J. Netw. Secur., 18 (4): 667-677 (2016)Misuse-based detection of Z-Wave network attacks., , , и . Comput. Secur., (2017)Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area Networks., , , и . IPCCC, стр. 469-474. IEEE Computer Society, (2008)An RF-DNA verification process for ZigBee networks., , и . MILCOM, стр. 1-6. IEEE, (2012)Evaluating the readiness of cyber first responders responsible for critical infrastructure protection., , , , и . Int. J. Crit. Infrastructure Prot., (2016)Comparison of High-end and Low-end Receivers for RF-DNA Fingerprinting., , и . MILCOM, стр. 24-29. IEEE, (2014)Subjective audio quality over a secure IEEE 802.11n network., , , и . Int. J. Secur. Networks, 6 (1): 53-63 (2011)Watching for Weakness in Wild WPANs., , , и . MILCOM, стр. 1404-1409. IEEE, (2013)