From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking., , и . ADHOC-NOW, том 5198 из Lecture Notes in Computer Science, стр. 345-356. Springer, (2008)A Reactive Wireless Mesh Network Architecture., , и . Med-Hoc-Net, том 265 из IFIP, стр. 203-214. Springer, (2008)TAR Channel Access Mechanism: A Study of a Highway Ramp Car Merge Case., , и . NTMS, стр. 1-5. IEEE, (2014)Network monitoring challenges in the evolved packet core., , и . Future Network & Mobile Summit, стр. 1-8. IEEE, (2012)Events-Based Security Monitoring Using MMT Tool., , и . ICST, стр. 860-863. IEEE Computer Society, (2012)Efficient time synchronization mechanism for wireless multi hop networks., , и . PIMRC, стр. 1-6. IEEE, (2008)An effective attack detection approach in wireless mesh networks., , , , , и . Int. J. Space Based Situated Comput., 5 (2): 89-99 (2015)Transmit and Reserve (TAR): A Coordinated Channel Access for IEEE 802.11 Networks., , и . WCNC, стр. 1-6. IEEE, (2010)An Effective Attack Detection Approach in Wireless Mesh Networks., , , , и . AINA Workshops, стр. 1450-1455. IEEE Computer Society, (2013)Light Client Management Protocol for Wireless Mesh Networks., , и . MDM, стр. 123. IEEE Computer Society, (2006)