Author of the publication

Large scale MANET emulations using U.S. Army waveforms with application: VoIP.

, , , and . MILCOM, page 2164-2169. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated mandatory access control for digital data., , , , and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6973 of SPIE Proceedings, page 697302. SPIE, (2008)Cyber Fighter Associate: A Decision Support System for cyber agility., , , and . CISS, page 198-203. IEEE, (2016)ACyDS: An adaptive cyber deception system., , , , , , , and . MILCOM, page 800-805. IEEE, (2016)Compression-based steganalysis of LSB embedded images., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 607207. SPIE, (2006)Steganalysis of ±1 Embedding using Lossless Image Compression., and . ICIP (2), page 149-152. IEEE, (2007)Using XACML for Embedded and Fine-Grained Access Control Policy., , , , and . ARES, page 462-468. IEEE Computer Society, (2009)Agility maneuvers to mitigate inference attacks on sensed location data., , , and . MILCOM, page 259-264. IEEE, (2016)Using adaptive lossless compression to characterize network traffic., and . CISS, page 276-277. IEEE, (2009)Lossless Compression-Based Steganalysis of LSB Embedded Images., and . CISS, page 923. IEEE, (2007)Packet Header Obfuscation Using MIMO., , , , , , , and . IEEE/ACM Trans. Netw., 28 (4): 1712-1725 (2020)