Author of the publication

Performance analysis of CR-honeynet to prevent jamming attack through stochastic modeling.

, , and . Pervasive Mob. Comput., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Quality of VoIP Streams over WiMax., , and . IEEE Trans. Computers, 57 (2): 145-156 (2008)A Game Theoretic Framework for Power Control in Wireless Sensor Networks., , and . IEEE Trans. Computers, 59 (2): 231-242 (2010)Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks., , and . ICC, page 1-5. IEEE, (2010)Performance of Adaptive Beam Nulling in Multihop Ad-Hoc Networks under Jamming., , , and . HPCC/CSS/ICESS, page 1236-1241. IEEE, (2015)Human Society Inspired Dynamic Spectrum Access Networks: The Effect of Parochialism., , and . GLOBECOM, page 1-5. IEEE, (2011)Implementation of interface agility for duplex dynamic spectrum access radio using USRP., and . MILCOM, page 762-767. IEEE, (2017)Understanding the feasibility of machine learning algorithms in a game theoretic environment for dynamic spectrum access., and . SPECTS, page 1-8. IEEE, (2017)Attribute based sharing in cybersecurity information exchange framework., , and . SPECTS, page 1-6. IEEE, (2017)Performance Modeling of Multi-Rate HDR and its Effect on TCP Throughput., , and . ICC, page 5206-5211. IEEE, (2007)BloCyNfo-Share: Blockchain based Cybersecurity Information Sharing with Fine Grained Access Control., , and . CCWC, page 317-323. IEEE, (2020)