Author of the publication

A Technical Survey on Methods for Detecting Rogue Access Points.

, , , , , and . IMIS, volume 994 of Advances in Intelligent Systems and Computing, page 215-226. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Local Mobility Anchor architecture for large scale mobility management., , and . PIMRC, page 2175-2179. IEEE, (2013)Secure firmware validation and update for consumer devices in home networking., , , and . IEEE Trans. Consumer Electronics, 62 (1): 39-44 (2016)Mobile Data Offloading: A Host-Based Distributed Mobility Management Approach., , , and . IEEE Internet Comput., 18 (1): 20-29 (2014)Blockchain-Based Distributed Firmware Update Architecture for IoT Devices., and . IEEE Access, (2020)Privacy Enhancing Factors in People-Nearby Applications., and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 6 (2): 113-121 (2015)Localized paging in proxy mobile IPv6 networks., and . Ann. des Télécommunications, 71 (9-10): 539-547 (2016)Basic Support for IPv6 Networks Operating Outside the Context of a Basic Service Set over IEEE Std 802.11., , , and . RFC, (December 2019)IEEE Access Special Section Editorial: Artificial Intelligence in Cybersecurity., , , , , , , and . IEEE Access, (2020)A Performance Analysis on Route Optimization for Proxy Mobile IPv6., , and . ICC, page 1-6. IEEE, (2009)Security issues of IPv6 communications in Cooperative Intelligent Transportation Systems (poster)., and . VNC, page 284-290. IEEE, (2011)