Author of the publication

Modeling Worm Propagation through Hidden Wireless Connections.

, , and . GLOBECOM, page 1-7. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SALS: semantics-aware location sharing based on cloaking zone in mobile social networks., , , and . MobiGIS, page 49-56. ACM, (2012)Privacy-preserving secure relative localization in vehicular networks., , and . Secur. Commun. Networks, 1 (3): 195-204 (2008)Scalable Team Multicast in Wireless Ad hoc Networks Exploiting Coordinated Motion., , and . Networked Group Communication, page 97-104. ACM, (2002)An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks., , and . IEEE Trans. Mob. Comput., 6 (8): 888-902 (2007)Secure Relative Location Determination in Vehicular Network., , and . MSN, volume 4325 of Lecture Notes in Computer Science, page 543-554. Springer, (2006)A new clustering approach and its application to BBL placement., , , , , and . EURO-DAC, page 665-669. IEEE Computer Society, (1990)Scalable ad hoc routing in large, dense wireless networks using clustering and landmarks., , , , and . ICC, page 3179-3185. IEEE, (2002)Experimental evaluation of LANMAR, a scalable ad-hoc routing protocol., , , , , and . WCNC, page 2032-2037. IEEE, (2005)C-ICAMA, a centralized intelligent channel assigned multiple access for multi-layer ad-hoc wireless networks with UAVs., , , , , and . WCNC, page 879-884. IEEE, (2000)Modeling Worm Propagation through Hidden Wireless Connections., , and . GLOBECOM, page 1-7. IEEE, (2009)