Author of the publication

On analyzing eavesdropping behaviours in underwater acoustic sensor networks.

, , , , , , and . WUWNet, page 53. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications., , , , , and . Comput. Stand. Interfaces, (2021)On Eavesdropping Attacks in Wireless Networks., , , , and . CSE/EUC/DCABES, page 138-141. IEEE Computer Society, (2016)Adversarial Input Detection Based on Critical Transformation Robustness., , , , and . ISSRE, page 390-401. IEEE, (2022)Coverage Analysis of Blockchain-enabled Wireless IoMT Networks., , , , and . GLOBECOM (Workshops), page 1-5. IEEE, (2021)Friendly-Jamming: An Anti-Eavesdropping Scheme in Wireless Networks of Things., , and . GLOBECOM, page 1-6. IEEE, (2016)On analyzing eavesdropping behaviours in underwater acoustic sensor networks., , , , , , and . WUWNet, page 53. ACM, (2016)An analytical model on eavesdropping attacks in wireless networks., , and . ICCS, page 538-542. IEEE, (2014)Stackelberg game-based task offloading in mobile edge computing-enabled hierarchical multi-coalition unmanned aerial vehicle networks., , , , , and . Int. J. Commun. Syst., (2024)Privacy and Security in Ubiquitous Integrated Sensing and Communication: Threats, Challenges and Future Directions., , , and . IEEE Internet Things Mag., 7 (4): 52-58 (2024)Eavesdropping attacks in underwater acoustic networks., , , and . ICICS, page 1-5. IEEE, (2015)