Author of the publication

JAMMY: A Distributed and Dynamic Solution to Selective Jamming Attack in TDMA WSNs.

, , , , and . IEEE Trans. Dependable Secur. Comput., 14 (4): 392-405 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Measurements of IEEE 802.15.4g Wireless Networks., , , and . WOWMOM, page 1-6. IEEE, (2019)CRMA MAC protocol: A simulative analysis., , , and . Comput. Commun., 16 (1): 39-47 (1993)IEEE 802.15.4e: A survey., , and . Comput. Commun., (2016)Power Management in Mobile and Pervasive Computing Systems., , and . Handbook of Algorithms for Wireless Networking and Mobile Computing, Chapman and Hall/CRC, (2005)An Experimental Evaluation of the 6top Protocol for Industrial IoT Applications., , , and . ISCC, page 1-6. IEEE, (2019)Dynamic Max-Min fairness in ring networks., , , and . Clust. Comput., 3 (3): 215-230 (2000)A Reliable Multicast Protocol for Distributed Mobile Systems: Design and Evaluation., , and . IEEE Trans. Parallel Distributed Syst., 12 (10): 1009-1022 (2001)Reliable and energy-efficient data collection in sparse sensor networks with mobile elements., , and . Perform. Evaluation, 66 (12): 791-810 (2009)Extending the Lifetime of Wireless Sensor Networks through Adaptive Sleep., , and . IEEE Trans. Ind. Informatics, 5 (3): 351-365 (2009)Introduction., , , , , and . ArtDeco, volume 7200 of Lecture Notes in Computer Science, Springer, (2012)