From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy risk analysis in the IoT domain., , , , , и . GIoTS, стр. 1-6. IEEE, (2018)Providing k-anonymity and revocation in ubiquitous VANETs., , , , и . Ad Hoc Networks, (2016)The Olympic Service Model: Issues and Architecture., , и . QofIS, том 2156 из Lecture Notes in Computer Science, стр. 170-189. Springer, (2001)Issues in TCP Vegas over Optical Burst Switching Networks., и . LCN, стр. 242-243. IEEE Computer Society, (2007)A simple routing scheme for improving ad hoc network survivability., , и . GLOBECOM, стр. 718-723. IEEE, (2003)Cooperative detection of primary user emulation attacks in CRNs., , и . Comput. Networks, 56 (14): 3374-3384 (2012)The TAMESIS Project: Enabling Technologies for the Health Status Monitoring and Secure Exchange of Clinical Record., , , , и . CISIS, стр. 312-319. IEEE Computer Society, (2013)Robust detection of primary user emulation attacks in IEEE 802.22 networks., , и . CogART, стр. 51. ACM, (2011)Towards a Cooperative Intrusion Detection System for Cognitive Radio Networks., , и . Networking Workshops, том 6827 из Lecture Notes in Computer Science, стр. 231-242. Springer, (2011)Contributions to the security of cognitive radio networks.. Polytechnic University of Catalonia, Spain, (2012)