Author of the publication

A Systematic Study of Maximal Scheduling Algorithms in Multiradio Multichannel Wireless Networks.

, , , and . IEEE/ACM Trans. Netw., 23 (4): 1342-1355 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware acceleration of TEA and XTEA algorithms on FPGA, GPU and multi-core processors (abstract only)., and . FPGA, page 270. ACM, (2013)CASTRA: Seamless and Unobtrusive Authentication of Users to Diverse Mobile Services., and . IEEE Internet of Things Journal, 5 (5): 4042-4057 (2018)Side channel attack on smartphone sensors to infer gender of the user: poster abstract., , and . SenSys, page 436-437. ACM, (2019)Capacity enhancement of cognitive wireless networks with 7-distance spectrum usage policy., and . ICC, page 78-82. IEEE, (2012)Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks., , and . GLOBECOM, page 1-6. IEEE, (2009)Guest Editorial Special Issue on Enabling a Smart City: Internet of Things Meets AI., , , and . IEEE Internet of Things Journal, 6 (5): 7469-7472 (2019)Automatic Construction of Attack Graphs in Cyber Physical Systems Using Temporal Logic., , , and . MILCOM, page 933-938. IEEE, (2018)Detecting and thwarting hardware trojan attacks in cyber-physical systems., , and . CNS, page 421-425. IEEE, (2016)Physics-Based Features for Anomaly Detection in Power Grids with Micro-PMUs., , , and . ICC, page 1-7. IEEE, (2018)Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks., , , , , and . IEEE Internet Things J., 3 (5): 816-829 (2016)