From post

Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks.

, и . WASA, том 5682 из Lecture Notes in Computer Science, стр. 358-367. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An approach to conformance testing of MIB implementations., и . Integrated Network Management, том 11 из IFIP Conference Proceedings, стр. 654-665. Chapman & Hall, (1995)Detecting rogue devices in bluetooth networks using radio frequency fingerprinting., , и . Communications and Computer Networks, стр. 108-113. IASTED/ACTA Press, (2006)Security Threat Mitigation Trends in Low-Cost RFID Systems., , и . DPM/SETOP, том 5939 из Lecture Notes in Computer Science, стр. 193-207. Springer, (2009)A new analysis of the cognitive radio jump-stay algorithm under the asymmetric model., , , и . ICC, стр. 1590-1595. IEEE, (2014)Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks., и . WASA, том 5682 из Lecture Notes in Computer Science, стр. 358-367. Springer, (2009)Delay and Reflection Attacks in Authenticated Semi-Quantum Direct Communications., и . GLOBECOM Workshops, стр. 1-7. IEEE, (2016)Underwater Confidential Communications in JANUS., , и . FPS, том 13877 из Lecture Notes in Computer Science, стр. 255-270. Springer, (2022)FTAM Test Design Using an Automated Test Tool., , , и . INFOCOM, стр. 251-260. IEEE Computer Society, (1989)Low-latency secure mobile communications., и . WiMob (2), стр. 38-43. IEEE, (2005)0-7803-9181-0.Anomaly-based intrusion detection using mobility profiles of public transportation users., , и . WiMob (2), стр. 17-24. IEEE, (2005)0-7803-9181-0.