From post

Network Parameters Impact on Dynamic Transmission Power Control in Vehicular Ad hoc Networks

. International Journal of Next-Generation Networks (IJNGN), 5 (3): 22 (сентября 2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On Perceptual Encryption: Variants of DCT Block Scrambling Scheme for JPEG Compressed Images., , и . FGIT-SIP/MulGraB, том 123 из Communications in Computer and Information Science, стр. 212-223. Springer, (2010)Privacy Interpretation of Behavioural-based Anomaly Detection Approaches., , и . CoRR, (2020)Quantitatively Measuring Privacy in Interactive Query Settings Within RDBMS Framework., , и . Frontiers Big Data, (2020)Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches., , и . CoRR, (2020)Local IP Access (LIPA) enabled 3G and 4G femtocell architectures., , и . CCECE, стр. 1049-1053. IEEE, (2011)A study of femtocell architectures for long term evolution (LTE)-advanced network., , и . CCECE, стр. 817-821. IEEE, (2011)On the detection of privacy and security anomalies.. University College Cork, Republic of Ireland, (2020)base-search.net (ftunivcollcork:oai:cora.ucc.ie:10468/10521).Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access., , и . IEEE BigData, стр. 3094-3099. IEEE, (2018)Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behaviour-Based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches., , и . EISA, том 1403 из Communications in Computer and Information Science, стр. 178-197. Springer, (2021)Towards Privacy-anomaly Detection: Discovering Correlation between Privacy and Security-anomalies., , и . FNC/MobiSPC, том 175 из Procedia Computer Science, стр. 331-339. Elsevier, (2020)