Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference in Two-Hop Wireless Networks., , , and . TrustCom/BigDataSE/ISPA (1), page 104-110. IEEE, (2015)Understanding the Usage of Industrial Control System Devices on the Internet., , , and . IEEE Internet of Things Journal, 5 (3): 2178-2189 (2018)Demo: a sensor network time synchronization protocol based on fm radio data system., , , , , and . MobiSys, page 367-368. ACM, (2011)An Open Conformance Test System towards the Standardization of Wireless Sensor Networks., , , , and . IJDSN, (2012)Improvement and Performance Evaluation for Multimedia Files Transmission in Vehicle-Based DTNs., , , , , and . IJDSN, (2013)Trajectory-Based Hierarchical Adaptive Forwarding in Vehicular Ad Hoc Networks., , , , , , , and . J. Sensors, (2017)Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence., , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 741-747. IEEE, (2018)BoSS: a moving strategy for mobile sinks in wireless sensor networks., , and . Int. J. Sens. Networks, 5 (3): 173-184 (2009)Defining Social Engineering in Cybersecurity., , and . IEEE Access, (2020)The XM Satellite Radio Software Module of an Embedded Car Audio System., , , , and . J. Softw., 7 (9): 1981-1992 (2012)