Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks., , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 222-238. Springer, (2014)Predicting Euro Stock Markets., , and . IFIN/ISEM@INSCI, volume 10078 of Lecture Notes in Computer Science, page 81-97. Springer, (2016)An UWB-based Location-Aided MAC Protocol for Wireless Sensor Networks., , , and . PIMRC, page 1-5. IEEE, (2007)Performance comparison of MANET routing protocols based on real-life scenarios., , and . ICUMT, page 870-877. IEEE, (2012)Evaluating selfishness impact on MANETs., , and . TEMU, page 64-68. IEEE, (2014)Global Communications Newsletter., , , , , , , and . IEEE Commun. Mag., 53 (12): 1-4 (2015)Fake Review Detection via Exploitation of Spam Indicators and Reviewer Behavior Characteristics., , and . SOFSEM, volume 10706 of Lecture Notes in Computer Science, page 581-595. Springer, (2018)Routing in Wireless Sensor Networks: An approach using Stackelberg games., and . WiMob, page 322-327. IEEE Computer Society, (2014)Analysing indirect Sybil attacks in randomly deployed Wireless Sensor Networks., , and . PIMRC, page 1-6. IEEE, (2016)Anomaly detection and localization in UWB wireless sensor networks., and . PIMRC, page 2326-2330. IEEE, (2013)