Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network simulation for MAC spoofing detection, using DTF method., and . SACI, page 291-296. IEEE, (2012)Mathematical Model and Formalization for DTF Method.. SOFA, volume 195 of Advances in Intelligent Systems and Computing, page 391-401. Springer, (2012)Using Fuzzy Logic to Determine If the Traffic Is Constant or Not in DTF Method., and . SOFA, volume 195 of Advances in Intelligent Systems and Computing, page 117-128. Springer, (2012)MSHOSIM - A tool for mobile station handover simulation., , and . SACI, page 363-368. IEEE, (2009)Testing DTF method for applicability in a real environment., and . SACI, page 285-289. IEEE, (2012)