Author of the publication

Security Analysis of Opportunistic Networks Using Complex Network Properties.

, , and . WASA, volume 7405 of Lecture Notes in Computer Science, page 462-478. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Analysis of Iterative and Recursive Programs., , and . Aust. Comput. J., 20 (1): 27-32 (1988)Formal Verification of Cognitive Models., and . FLAIRS, page 420-425. AAAI Press, (2006)Selective Querying in Sensor Networks: Parameters and Strategies., , and . AINA, page 323-330. IEEE Computer Society, (2007)Economic-based vs. nature-inspired intruder detection in sensor networks., , and . CRiSIS, page 177-184. IEEE, (2008)Eliciting and Formalizing Tolerance and Leniency in Engineering Design Requirements., and . FSKD, page 96-100. (2002)Algebraic Approach to Specifying Part-Whole Associations., and . FLAIRS, page 838-839. AAAI Press, (2005)Patterns and conflicts for the specification of cognitive models., , , and . IADIS AC, page 393-400. IADIS, (2005)Knowledge-Level Assessment of Problem-Solving Methods., and . HICSS (2), page 220-. IEEE Computer Society, (1996)An Extended Possibility-Based Fuzzy Nested Relational Database Model and Algebra., and . Intelligent Information Processing, volume 221 of IFIP Conference Proceedings, page 285-288. Kluwer, (2002)Use-Perspective Unit Documentation., and . CSEE, volume 423 of Lecture Notes in Computer Science, page 136-144. Springer, (1990)