Author of the publication

Security Analysis of Network-Oblivious Internet-Wide Scan for IEEE 802.11ah Enabled IoT.

, , and . VTC Fall, page 1-5. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual-MIMO-Boosted Information Propagation on Highways., , , , and . CoRR, (2015)REFWA: an efficient and fair congestion control scheme for LEO satellite networks., , and . IEEE/ACM Trans. Netw., 14 (5): 1031-1044 (2006)Divide and Conquer Technique for Network Fault Management., , , , , and . Integrated Network Management, volume 86 of IFIP Conference Proceedings, page 675-687. Chapman & Hall, (1997)Network Controlled Handover for Improving TCP Performance in LEO Satellite Networks., , , , and . GLOBECOM, IEEE, (2006)Virtual Cell Based Resource Allocation for Efficient Frequency Utilization in Unmanned Aircraft Systems., , , , , and . IEEE Trans. Vehicular Technology, 67 (4): 3495-3504 (2018)A new smooth handoff scheme for mobile multimedia streaming using RTP dummy packets and RTCP explicit handoff notification., , , , and . WCNC, page 2162-2167. IEEE, (2006)Network Application Identification Using Transition Pattern of Payload Length., , , , , and . WCNC, page 2633-2638. IEEE, (2008)An Efficient Data Transfer Method for Distributed Storage System over Satellite Networks., , , and . VTC Spring, page 1-5. IEEE, (2013)Toward terminal-to-terminal communication networks: A hybrid MANET and DTN approach., , and . CAMAD, page 228-232. IEEE, (2013)The President's Page., and . IEEE Communications Magazine, 56 (3): 4-5 (2018)