Author of the publication

Secure routing for mobile ad hoc networks

, and . IEEE Communications Surveys & Tutorials, 7 (3): 2--21 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure routing for mobile ad hoc networks, and . IEEE Communications Surveys & Tutorials, 7 (3): 2--21 (2005)ICT PD 4 Me!. ITEM, volume 230 of IFIP, page 167-177. Springer, (2006)ITEM Strategic Planning: Two Approaches.. ITEM, volume 292 of IFIP, page 1-8. Springer, (2008)Modeling and implementation of a simplified human tendon structure in a robotic finger., , , and . BioRob, page 120-125. IEEE, (2016)Analyzing the Vulnerability of Wireless Sensor Networks to a Malicious Matched Protocol Attack., , and . ICCST, page 1-5. IEEE, (2018)Linking Organisation Culture to IS Strategy: A model and interim results., and . PACIS, page 61. AISeL, (1997)ITEM Evolution: Conference Discussion Group Paper., , , and . ITEM, volume 292 of IFIP, page 1-11. Springer, (2008)Identifying Distinct Features based on Received Samples for Interference Detection in Wireless Sensor Network Edge Devices., , and . WTS, page 1-7. IEEE, (2020)Analyzing using Software Defined Radios as Wireless Sensor Network Inspection and Testing Devices: An Internet of Things Penetration Testing Perspective., , and . GIoTS, page 1-6. IEEE, (2020)Detecting Interference in Wireless Sensor Network Received Samples: A Machine Learning Approach., , and . WF-IoT, page 1-6. IEEE, (2020)