Author of the publication

Design and Assessment of a Reputation-Based Trust Framework in Wireless Testbeds Utilizing User Experience.

, , , and . ADHOC-NOW, volume 7960 of Lecture Notes in Computer Science, page 1-12. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Temporal Dynamics of Information Diffusion in Twitter: Modeling and Experimentation., , , and . IEEE Trans. Comput. Social Systems, 5 (1): 256-264 (2018)On the Risk-Based Operation of Mobile Attacks in Wireless Ad Hoc Networks., , and . ICC, page 1130-1135. IEEE, (2007)Modeling and analysis of the position-guided sliding-window routing protocol., and . ICC, page 1680-1684. IEEE, (2003)A network fault diagnostic approach based on a statistical traffic normality prediction algorithm., and . GLOBECOM, page 2918-2922. IEEE, (2003)Hierarchical Anomaly Detection in Distributed Large-Scale Sensor Networks., , , and . ISCC, page 761-767. IEEE Computer Society, (2006)Strategy evolution of information diffusion under time-varying user behavior in generalized networks., , , and . Comput. Commun., (2017)Enhancing network traffic prediction and anomaly detection via statistical network traffic separation and combination strategies., and . Comput. Commun., 29 (10): 1627-1638 (2006)Game theoretic distributed uplink power control for CDMA networks with real-time services., and . Comput. Commun., 32 (2): 376-385 (2009)Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis., , and . J. Comput. Sci. Technol., 23 (3): 389-399 (2008)Intelligent Flow-Based Sampling for Effective Network Anomaly Detection., and . GLOBECOM, page 1948-1953. IEEE, (2007)