Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A statistical trust system in wireless mesh networks., , , , and . Ann. des Télécommunications, 71 (5-6): 187-199 (2016)A statistical detection mechanism for node misbehaviours in wireless mesh networks., , and . Int. J. Ad Hoc Ubiquitous Comput., 31 (1): 23-35 (2019)A Bayesian Statistical Model to Alleviate Greediness in Wireless Mesh Networks., , and . GLOBECOM, page 1-6. IEEE, (2010)Towards combining admission control and link scheduling in wireless mesh networks., , , and . Telecommun. Syst., 66 (1): 39-54 (2017)A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks., , , , and . Comput. Networks, (2017)Flooding attacks detection in MANETs., , , , and . SSIC, page 1-6. IEEE, (2015)Bayesian-based model for a reputation system in vehicular networks., , , and . SSIC, page 1-6. IEEE, (2015)Bayesian statistical analysis for spams., and . LCN, page 989-992. IEEE Computer Society, (2010)Vehicle Driving Pattern Based Sybil Attack Detection., , , and . HPCC/SmartCity/DSS, page 1282-1288. IEEE Computer Society, (2016)Exact Cramer Rao Bound for near field source localization., , and . ISSPA, page 718-721. IEEE, (2012)