Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power Control Game in Multi-Terminal Covert Timing Channels., , , and . IEEE J. Sel. Areas Commun., 30 (1): 44-53 (2012)Scheduling Algorithm Based on Load-Aware Queue Partitioning in Heterogeneous Multi-core Systems., , , , and . IEA/AIE (2), volume 13926 of Lecture Notes in Computer Science, page 189-200. Springer, (2023)Is Channel Fragmentation/bonding in IEEE 802.22 Networks Secure?, , , and . ICC, page 1-5. IEEE, (2011)Detecting Promotion Attacks in the App Market Using Neural Networks., , , , and . IEEE Wirel. Commun., 26 (4): 110-116 (2019)On Adversarial Games in Dynamic Spectrum Access Networking based Covert Timing Channels?, , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 13 (2): 96-107 (2009)Using Sybil Identities for Primary User Emulation and Byzantine Attacks in DSA Networks., , , and . GLOBECOM, page 1-5. IEEE, (2011)Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities., , , , , and . IEEE Trans. Veh. Technol., 63 (8): 3867-3874 (2014)SpiderRadio: A Cognitive Radio Implementation Using IEEE 802.11 Components., , and . IEEE Trans. Mob. Comput., 12 (11): 2105-2118 (2013)Security Vulnerability Due to Channel Aggregation/Bonding in LTE and HSPA+ Network., , , , and . GLOBECOM, page 1-5. IEEE, (2011)Spectrum Stealing via Sybil Attacks in DSA Networks: Implementation and Defense., , , and . ICC, page 1-5. IEEE, (2011)