From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting rogue devices in bluetooth networks using radio frequency fingerprinting., , и . Communications and Computer Networks, стр. 108-113. IASTED/ACTA Press, (2006)An approach to conformance testing of MIB implementations., и . Integrated Network Management, том 11 из IFIP Conference Proceedings, стр. 654-665. Chapman & Hall, (1995)Security Threat Mitigation Trends in Low-Cost RFID Systems., , и . DPM/SETOP, том 5939 из Lecture Notes in Computer Science, стр. 193-207. Springer, (2009)Delay and Reflection Attacks in Authenticated Semi-Quantum Direct Communications., и . GLOBECOM Workshops, стр. 1-7. IEEE, (2016)Tuning the demodulation frequency based on a normalized trajectory model for mobile underwater acoustic communications., , , , и . Trans. Emerg. Telecommun. Technol., (2019)Insider attack attribution using signal strength-based hyperbolic location estimation., и . Secur. Commun. Networks, 1 (4): 337-349 (2008)Probabilistic Evidence Aggregation for Malicious Node Position Bounding in Wireless Networks., и . J. Networks, 4 (1): 9-18 (2009)Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks., и . WASA, том 5682 из Lecture Notes in Computer Science, стр. 358-367. Springer, (2009)Next Generation Resilient Cyber-Physical Systems., , , и . CoRR, (2019)A new analysis of the cognitive radio jump-stay algorithm under the asymmetric model., , , и . ICC, стр. 1590-1595. IEEE, (2014)