Author of the publication

Wireless Forensic: A New Radio Frequency Based Locating System.

, , , and . ISI Workshops, volume 5075 of Lecture Notes in Computer Science, page 272-277. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poster: collaborative policy administration., , , , and . ACM Conference on Computer and Communications Security, page 777-780. ACM, (2011)Two Birds With One Stone: Wireless Access Point Deployment for Both Coverage and Localization., , , , , and . IEEE Trans. Veh. Technol., 60 (5): 2239-2252 (2011)COCA: Constructing optimal clustering architecture to maximize sensor network lifetime., , , , , and . Comput. Commun., 36 (3): 256-268 (2013)Agent-Based Data Mining Approach for the Prediction of UK and Irish Companies Performance., and . BNCOD, volume 3112 of Lecture Notes in Computer Science, page 100-105. Springer, (2004)A near lossless compression domain volume rendering algorithm for floating-point time-varying volume data., , , , , , and . J. Vis., 18 (2): 147-157 (2015)Identifying Google Talk packets., , , and . ISI, page 285-290. IEEE, (2009)Parameter estimation with improved model prediction for over-parametrized nonlinear systems., , and . Comput. Chem. Eng., (2022)On the privacy protection in publish/subscribe systems., , and . WCNIS, page 597-601. IEEE, (2010)Analyzing Privacy in Enterprise Packet Trace Anonymization., , , and . NDSS, The Internet Society, (2008)Learning Single-Image 3D from the Internet.. University of Michigan, USA, (2020)