Author of the publication

Performance analysis of movements detection with RA beaconing in wireless IP networks.

, , , and . Int. J. Wirel. Mob. Comput., 4 (2): 136-147 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Service function chaining deployed in an NFV environment: An availability modeling., , , , and . CSCN, page 42-47. IEEE, (2017)Availability Modeling and Evaluation of a Network Service Deployed via NFV., , , and . TIWDC, volume 766 of Communications in Computer and Information Science, page 31-44. Springer, (2017)Multiple Cyber-Threats Containment Via Kendall's Birth-Death-Immigration Model., , , and . EUSIPCO, page 2554-2558. IEEE, (2018)Botnet identification in multi-clustered DDoS attacks., , and . EUSIPCO, page 2171-2175. IEEE, (2017)Adversarial Detection of Concealed VoIP Traffic., , , , and . ICNC, page 437-441. IEEE, (2019)Performance analysis of movements detection with RA beaconing in wireless IP networks., , , and . Int. J. Wirel. Mob. Comput., 4 (2): 136-147 (2010)Cyber-Threat Mitigation Exploiting the Birth-Death-Immigration Model., , , and . IEEE Trans. Inf. Forensics Secur., 13 (12): 3137-3152 (2018)Energy-Efficient Target Tracking in Sensor Networks., and . ADHOCNETS, volume 49 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 249-264. Springer, (2010)DDoS Attacks with Randomized Traffic Innovation: Botnet Identification Challenges and Strategies., , and . CoRR, (2016)Finding an OSPA based object detector by aweakly supervised technique., , , , and . IGARSS, page 4403-4406. IEEE, (2012)