Author of the publication

Detecting and connecting disjoint sub-networks in wireless sensor and actor networks.

, and . Ad Hoc Networks, 7 (7): 1330-1346 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards realistic connectivity restoration in partitioned mobile sensor networks., , and . Int. J. Commun. Syst., 29 (2): 230-250 (2016)UAV-Assisted Multi-path Parallel Routing for mmWave-Based Wireless Networks., , , and . Internet Things, (2021)Privacy-Preserving Power Injection Over a Hybrid AMI/LTE Smart Grid Network., , , and . IEEE Internet of Things Journal, 4 (4): 870-880 (2017)Utilizing Advanced Metering Infrastructure to Build a Public Key Infrastructure for Electric Vehicles., and . DIVANet@MSWiM, page 91-98. ACM, (2017)OS Independent and Hardware-Assisted Insider Threat Detection and Prevention Framework., , , , and . MILCOM, page 926-932. IEEE, (2018)Sink repositioning for enhanced performance in wireless sensor networks., , and . Comput. Networks, 49 (4): 512-534 (2005)Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game Approach., , , and . IEEE Trans. Netw. Sci. Eng., 8 (1): 751-764 (2021)Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks., , and . IEEE Trans. Parallel Distributed Syst., 20 (9): 1366-1379 (2009)Occupancy Counting With Burst and Intermittent Signals in Smart Buildings., , , , and . IEEE Internet of Things Journal, 5 (2): 724-735 (2018)Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks., , and . MILCOM, page 946-951. IEEE, (2018)