Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Routing in Wireless Mobile Ad Hoc Networks without the Support of Key Management Infrastructure., , and . International Conference on Wireless Networks, page 210-218. CSREA Press, (2004)A simple model of real-time flow aggregation., and . IEEE/ACM Trans. Netw., 11 (3): 422-435 (2003)Methodology for traffic modeling using two-state Markov-modulated Bernoulli process., , , and . Comput. Commun., 22 (13): 1266-1273 (1999)Ransomware in Windows and Android Platforms., , , and . CoRR, (2020)Evaluating Location Privacy in Vehicular Communications and Applications., , and . IEEE Trans. Intell. Transp. Syst., 17 (9): 2658-2667 (2016)Knowing the Enemy at the Gates: Measuring Attacker Motivation., , , , and . Int. J. Interdiscip. Telecommun. Netw., 5 (2): 83-95 (2013)Intrusion Detection System for Wireless Sensor Networks., , , and . Security and Management, page 582-585. CSREA Press, (2008)Secure Inter-Vehicle Vital Signal Communication via Short Dynamic Group Management., , and . Security and Management, page 415-421. CSREA Press, (2008)Optional dynamic bandwidth allocation based on playback tunnel to support video-on-demand service in virtual private networks., and . Comput. Commun., 24 (11): 1019-1030 (2001)An Intelligent Behavior-Based Ransomware Detection System For Android Platform., , , and . TPS-ISA, page 28-35. IEEE, (2019)