From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Queuing the trust: Secure backpressure algorithm against insider threats in wireless networks., , и . INFOCOM, стр. 253-261. IEEE, (2015)Systems design of cybersecurity in embedded systems., , , , , , , , , и . HPEC, стр. 1-6. IEEE, (2016)Distributed cognitive radio network architecture, SDR implementation and emulation testbed., , , , , и . MILCOM, стр. 438-443. IEEE, (2015)Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks., , , , , и . ICPADS (1), стр. 613-620. IEEE Computer Society, (2006)MORPH: Enhancing System Security through Interactive Customization of Application and Communication Protocol Features., , , , , и . CCS, стр. 2315-2317. ACM, (2018)Mobile network performance evaluation using the radio frequency network channel emulation simulation tool(RFnest™)., , , , , , и . MobiCom, стр. 155-158. ACM, (2013)Airborne network evaluation: challenges and high fidelity emulation solution., , , , , , и . IEEE Commun. Mag., 52 (10): 30-36 (2014)RFnest™: Radio frequency network emulator simulator tool., , , , , и . MILCOM, стр. 1882-1887. IEEE, (2011)Securing the Backpressure Algorithm for Wireless Networks., , и . IEEE Trans. Mob. Comput., 16 (4): 1136-1148 (2017)A scalable key management and clustering scheme for ad hoc networks., , , и . Infoscale, том 152 из ACM International Conference Proceeding Series, стр. 28. ACM, (2006)