From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identity Based Key Distribution Framework for Link Layer Security of AMI Networks., , , и . IEEE Trans. Smart Grid, 9 (4): 3166-3179 (2018)EmuNET: a real-time network emulator., и . SAC, стр. 357-362. ACM, (2004)A resource reservation attack against LTE networks., , , и . ICCIT, стр. 262-268. IEEE, (2013)PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems., , , и . ATC, том 4158 из Lecture Notes in Computer Science, стр. 205-216. Springer, (2006)Energy-efficient truncated multipliers with scaling., , , , , , и . IDT, стр. 1-6. IEEE, (2013)Virtualized network views for localizing misbehaving sources in SDN data planes., , , и . ICC, стр. 1-7. IEEE, (2017)Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices., , и . SecureComm, стр. 240-242. IEEE, (2005)Statistical methodology for modeling non-IID memory fails events., , , , и . ISQED, стр. 205-211. IEEE, (2014)Signaling oriented denial of service on LTE networks., , , и . MOBIWAC, стр. 153-158. ACM, (2012)Software Defined IoT security framework., , , и . SDS, стр. 75-80. IEEE, (2017)