From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Flow-based XOR Network Coding for Lossy Wireless Networks., , , и . IEEE Trans. Wirel. Commun., 11 (6): 2321-2329 (2012)MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks., , и . SecureComm, стр. 1-12. IEEE, (2006)Stream: Low Overhead Wireless Reprogramming for Sensor Networks., , и . INFOCOM, стр. 928-936. IEEE, (2007)LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks., , и . Comput. Networks, 51 (13): 3750-3772 (2007)Dependable wireless sensor networks for reliable and secure humanitarian relief applications., , , и . Ad Hoc Networks, (2014)An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks., , , и . Sensors, 12 (7): 8782-8805 (2012)DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks., , и . SecureComm, стр. 89-100. IEEE, (2005)A minorization-maximization algorithm for an-based mimome secrecy rate maximization., , , , и . GlobalSIP, стр. 975-980. IEEE, (2016)Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure., и . IEEE Trans. Mob. Comput., 10 (8): 1096-1112 (2011)Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping., , и . Ad Hoc Networks, 7 (1): 42-62 (2009)