From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reliable data fusion in wireless sensor networks under Byzantine attacks., , и . MILCOM, стр. 810-815. IEEE, (2011)An Automatic Attribute Based Access Control Policy Extraction from Access Logs., , , и . CoRR, (2020)Data Credence in IoT: Vision and Challenges., , , , и . Open J. Internet Things, 3 (1): 114-126 (2017)Adaptive ABAC Policy Learning: A Reinforcement Learning Approach., , и . CoRR, (2021)Diversity for Detecting Routing Attacks in Multihop Networks., , и . ICNC, стр. 712-717. IEEE Computer Society, (2018)Identifying Malicious Nodes in Multihop IoT Networks Using Diversity and Unsupervised Learning., , , и . ICC, стр. 1-6. IEEE, (2018)N-Hop networks: a general framework for wireless systems., , и . IEEE Wirel. Commun., 21 (2): 98-105 (2014)Mobile Coordinated Wireless Sensor Network: An Energy Efficient Scheme for Real-Time Transmissions., , и . IEEE J. Sel. Areas Commun., 34 (5): 1663-1675 (2016)Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks., , , и . IEEE Trans. Parallel Distributed Syst., 25 (4): 950-959 (2014)Mobile Access Coordinated Wireless Sensor Networks - Design and Analysis., , и . IEEE Trans. Signal Inf. Process. over Networks, 3 (1): 172-186 (2017)