Author of the publication

Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis.

, , and . J. Comput. Sci. Technol., 23 (3): 389-399 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent Flow-Based Sampling for Effective Network Anomaly Detection., and . GLOBECOM, page 1948-1953. IEEE, (2007)A continuum theory-based approach to the modeling of dynamic wireless sensor networks., and . IEEE Communications Letters, 9 (4): 337-339 (2005)An entropy-based model for supporting and evaluating route stability in mobile ad hoc wireless networks., and . IEEE Communications Letters, 6 (8): 328-330 (2002)Scalability in Global Mobile Information Systems (GloMo): Issues, Evaluation Methodology and Experiences., , , , and . Wireless Networks, 8 (6): 637-648 (2002)Utility Based Short-term Throughput Driven Scheduling Approach for Efficient Resource Allocation in CDMA Wireless Networks., and . Wireless Personal Communications, 52 (3): 517-535 (2010)User Optimal Throughput-Delay Trade-off in Multihop Networks Under NUM Framework., and . IEEE Communications Letters, 18 (11): 1999-2002 (2014)Enhancing network traffic prediction and anomaly detection via statistical network traffic separation and combination strategies., and . Comput. Commun., 29 (10): 1627-1638 (2006)A Realistic Evaluation of MRF-based Resource Allocation for SDR Cognitive Radio Networks., , , and . LCN, page 185-192. IEEE, (2019)Providing End-to-End Quality-of-Service with Optimal Least Weight Routing in Next-Generation Multi-Service High-Speed Networks., and . J. Netw. Syst. Manag., 10 (3): 281-308 (2002)Risk-Aware Data Offloading in Multi-Server Multi-Access Edge Computing Environment., , and . IEEE/ACM Trans. Netw., 28 (3): 1405-1418 (2020)