From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Scalability of Correlation Clustering Through Constraint Reduction., , и . CODS, стр. 1-10. ACM, (2014)Multipath TCP for V2I communication in SDN controlled small cell deployment of smart city., , , и . Veh. Commun., (2019)Distributed Service Level Flow Control and Fairness in Wireless Mesh Networks., и . IEEE Trans. Mob. Comput., 14 (11): 2229-2243 (2015)Detecting Metamorphic Virus Using Hidden Markov Model and Genetic Algorithm., , , и . SocProS (2), том 131 из Advances in Intelligent and Soft Computing, стр. 305-315. Springer, (2011)An Active Intrusion Detection System for LAN Specific Attacks., , , , , , , и . AST/UCMA/ISA/ACN, том 6059 из Lecture Notes in Computer Science, стр. 129-142. Springer, (2010)Machine Learning Based Approach to Detect Position Falsification Attack in VANETs., , , , и . ISEA-ISAP, том 939 из Communications in Computer and Information Science, стр. 166-178. Springer, (2018)Elliptic Curve Cryptography Based Mechanism for Secure Wi-Fi Connectivity., , , , и . ICDCIT, том 11319 из Lecture Notes in Computer Science, стр. 422-439. Springer, (2019)Performance optimization in single channel directional multi-interface IEEE 802.11s EDCA using beam prioritization., , и . ICC, стр. 5451-5456. IEEE, (2012)Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol., , и . SIN, стр. 111-118. ACM, (2011)DisTree: A scheme for DHT., и . ICACCI, стр. 794-799. IEEE, (2013)