Author of the publication

Effective and robust detection of jamming attacks

, , and . Future Network and MobileSummit 2010 Conference Proceedings, page 1-8. (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

I-CAN: Information-centric future mobile and wireless access networks., , , , and . QSHINE, page 139-141. IEEE, (2014)Access point assignment algorithms in WLANs based on throughput objectives., and . WiOpt, page 375-383. IEEE, (2008)Security requirements and solutions for integrated satellite-terrestrial Information-Centric Networks., , , and . ASMS/SPSC, page 106-113. IEEE, (2014)Enhancing mobile data offloading with mobility prediction and prefetching., and . MobiArch@MobiCom, page 17-22. ACM, (2012)IoT Resource Access utilizing Blockchains and Trusted Execution Environments., , , , and . GIoTS, page 1-6. IEEE, (2019)Adjacent channel interference in 802.11a is harmful: Testbed validation of a simple quantification model., , , and . IEEE Communications Magazine, 49 (3): 160-166 (2011)Experiences with a metropolitan multiradio wireless mesh network: design, performance, and application., , and . IEEE Communications Magazine, 50 (7): 128-136 (2012)OAuth 2.0 authorization using blockchain-based tokens., , , , and . CoRR, (2020)Resource control for hybrid code and time division scheduling.. PIMRC, page 1772-1776. IEEE, (2004)Enhancing mobile data offloading with mobility prediction and prefetching., and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 17 (1): 22-29 (2013)