Author of the publication

An evolutionary game theoretic framework for coexistence in Cognitive Radio Networks.

, , , and . GlobalSIP, page 278-282. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User-side Wi-Fi Evil Twin Attack detection using SSL/TCP protocols., , , and . CCNC, page 239-244. IEEE, (2015)Parallel active dictionary attack on WPA2-PSK Wi-Fi networks., , , and . MILCOM, page 665-670. IEEE, (2015)An evolutionary game theoretic framework for coexistence in Cognitive Radio Networks., , , and . GlobalSIP, page 278-282. IEEE, (2014)Parallel active dictionary attack on WPA2-PSK Wi-Fi networks., , , and . MILCOM, page 665-670. IEEE, (2015)User-side Wi-Fi evil twin attack detection using random wireless channel monitoring., and . MILCOM, page 1243-1248. IEEE, (2016)SPS: An SMS-based push service for energy saving in smartphone's idle state., , and . CCNC, page 53-58. IEEE, (2015)Circumvent traffic shaping using virtual wireless clients in IEEE 802.11 wireless local area network., and . MILCOM, page 52-56. IEEE, (2017)Fault-Tolerant Network-Server Architecture for Time-Critical Web Applications., , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 377-384. IEEE Computer Society, (2017)Exposing Vulnerabilities in Mobile Networks: A Mobile Data Consumption Attack., , , , and . MASS, page 550-554. IEEE Computer Society, (2017)Exposing Vulnerabilities in Mobile Networks: A Mobile Data Consumption Attack., , , , and . CoRR, (2018)