Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collisions for secrecy in cooperative cognitive radio networks with time-varying connectivity., and . GLOBECOM Workshops, page 1332-1336. IEEE, (2014)Multiple access game with a cognitive jammer., and . ACSCC, page 1383-1387. IEEE, (2012)Optimal scheduling in cooperate-to-join Cognitive Radio Networks., , , and . INFOCOM, page 3002-3010. IEEE, (2011)Stalling Live Migrations on the Cloud., , , , , and . WOOT, USENIX Association, (2017)Predicting Different Health and Lifestyle Behaviors of Social Media Users., , , and . RCAI, volume 12948 of Lecture Notes in Computer Science, page 57-66. Springer, (2021)On the delay limited secrecy capacity of fading channels., , , and . ISIT, page 2617-2621. IEEE, (2009)NEST: Efficient Transport of Data Summaries over Named Data Networks., , , , and . Networking, page 280-288. IFIP, (2018)Secrecy in cognitive radio networks: Turning foes to allies., and . WiOpt, page 194-200. IEEE, (2013)Jaal: Towards Network Intrusion Detection at ISP Scale., , , , , , , , and . CoNEXT, page 134-146. ACM, (2017)Turning foes to allies in cognitive radio networks., and . Ad Hoc Networks, (2015)