Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A machine learning approach for dynamic spectrum access radio identification., , and . GLOBECOM, page 1041-1046. IEEE, (2014)A hidden Markov model detection of malicious Android applications at runtime., , , , and . WOCC, page 1-6. IEEE, (2014)Malware propagation in fully connected networks: A netflow-based analysis., , , , , , and . MILCOM, page 497-502. IEEE, (2016)Performance impact of pilot tone randomization to mitigate OFDM jamming attacks., , and . CCNC, page 813-816. IEEE, (2013)An Assessment of OFDM Carrier Frequency Offset Synchronization Security for 4G Systems., , and . MILCOM, page 473-478. IEEE, (2014)Equalization attacks against OFDM: analysis and countermeasures., , and . Wirel. Commun. Mob. Comput., 16 (13): 1809-1825 (2016)Protecting physical layer synchronization: mitigating attacks against OFDM acquisition., , , and . WPMC, page 1-6. IEEE, (2013)Beampattern analysis for MIMO radar and telecommunication system coexistence., , , and . ICNC, page 534-539. IEEE, (2014)Performance impact of asynchronous off-tone jamming attacks against OFDM., , , and . ICC, page 2177-2182. IEEE, (2013)A neural network approach to category validation of Android applications., , , , and . ICNC, page 740-744. IEEE Computer Society, (2013)