From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Flow-based XOR Network Coding for Lossy Wireless Networks., , , и . IEEE Trans. Wirel. Commun., 11 (6): 2321-2329 (2012)Dependable wireless sensor networks for reliable and secure humanitarian relief applications., , , и . Ad Hoc Networks, (2014)LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks., , и . Comput. Networks, 51 (13): 3750-3772 (2007)MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks., , и . SecureComm, стр. 1-12. IEEE, (2006)Stream: Low Overhead Wireless Reprogramming for Sensor Networks., , и . INFOCOM, стр. 928-936. IEEE, (2007)DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks., , и . SecureComm, стр. 89-100. IEEE, (2005)An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks., , , и . Sensors, 12 (7): 8782-8805 (2012)A minorization-maximization algorithm for an-based mimome secrecy rate maximization., , , , и . GlobalSIP, стр. 975-980. IEEE, (2016)On the continuous coverage problem for a swarm of UAVs., , , , и . Sarnoff Symposium, стр. 130-135. IEEE, (2016)Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference., , , и . ACM Trans. Priv. Secur., 23 (4): 17:1-17:36 (2020)