From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Vulnerability Exploitation Conveying Digital Data Over Mobile Voice Call Channels., , , , , , , и . Wireless Personal Communications, 96 (1): 1145-1172 (2017)Gold standard auditing for router configurations., , , и . LANMAN, стр. 1-6. IEEE, (2010)3G Meets the Internet: Understanding the performance of hierarchical routing in 3G networks., , и . ITC, стр. 15-22. IEEE, (2011)WISE Abstraction Framework for Wireless Networks.. University of Maryland, College Park, MD, USA, (2006)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/3867).Proactive Network Management of IPTV Networks., , , , , , , и . INM/WREN, USENIX Association, (2010)SMOG: A cloud platform for seamless wide area migration of online games., , , , и . NetGames, стр. 1-6. IEEE, (2012)Robust Routing in Wireless Ad Hoc Networks., , и . ICPP Workshops, стр. 73-78. IEEE Computer Society, (2002)The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack., , , и . ICDCS, стр. 137-144. IEEE Computer Society, (2009)Efficient Packet Error Rate Estimation in Wireless Networks., и . TRIDENTCOM, стр. 1-9. IEEE, (2007)Channel Access Throttling for Overlapping BSS Management., , , , и . ICC, стр. 1-6. IEEE, (2009)