Author of the publication

Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path.

, , and . WCNC, page 2106-2111. IEEE, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling treatment and drug effects at the molecular level using hybrid system theory., , and . CIBCB, page 1-7. IEEE, (2010)Big uncertain data of multiple sensors efficient processing with high order multi-hypothesis: an evidence theoretic approach., , , , and . Int. J. Big Data Intell., 5 (3): 177-190 (2018)Recurrent Neural Network Based Feature Selection for High Dimensional and Low Sample Size Micro-array Data., , and . IEEE BigData, page 4823-4828. IEEE, (2019)Mitigating Uplink interference in femtocell networks with Physical Layer Network coding., , , and . IEEE ANTS, page 1-6. IEEE, (2013)Closed loop control of blood glucose level with neural network predictor for diabetic patients., , and . Healthcom, page 1-6. IEEE, (2017)Efficient Computing of Dempster-Shafer Theoretic Conditionals for Big Hard/Soft Data Fusion., , , , and . FUSION, page 643-650. IEEE, (2018)Joint power control and maximally disjoint routing for reliable data delivery in multihop CDMA wireless ad hoc networks., , , , and . WCNC, page 300-306. IEEE, (2006)Femtocell as a relay with application of physical layer network coding., , and . CCNC, page 513-518. IEEE, (2014)Distributed spectrum monitoring and surveillance using a cognitive radio based testbed., , , , , and . Sarnoff Symposium, page 100-105. IEEE, (2016)Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep Learning., , , , , and . FMEC, page 98-104. IEEE, (2019)