From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Auxiliary Sensors for Pairwise Key Establishment in WSN., и . ACM Trans. Embed. Comput. Syst., 11 (3): 59:1-59:31 (2012)Mitigating jamming attacks in wireless broadcast systems., , и . Wireless Networks, 19 (8): 1867-1880 (2013)Using Auxiliary Sensors for Pairwise Key Establishment in WSN., и . Networking, том 4479 из Lecture Notes in Computer Science, стр. 251-262. Springer, (2007)Fast jamming detection in sensor networks., , , и . ICC, стр. 934-938. IEEE, (2012)Hardening Embedded Networking Devices Against Side-Channel Attacks., и . Ad Hoc Sens. Wirel. Networks, 12 (1-2): 103-124 (2011)Secure and Resilient Localization in Wireless Sensor Networks., , и . Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, том 30 из Advances in Information Security, Springer, (2007)Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models., , и . Comput. Secur., (2016)Security for Wireless Sensor Networks, и . Advances in Information Security Springer, (2007)Efficient and distributed access control for sensor networks.. Wireless Networks, 16 (8): 2151-2167 (2010)Location Privacy in Sensor Networks Against a Global Eavesdropper., , и . ICNP, стр. 314-323. IEEE Computer Society, (2007)