Author of the publication

A novel packet size based covert channel attack against anonymizer.

, , , , and . INFOCOM, page 186-190. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust object tracking in the X-Z domain., , and . MFI, page 499-504. IEEE, (2016)Turning heterogeneity into an advantage in wireless ad-hoc network routing., , and . Ad Hoc Networks, 8 (1): 108-118 (2010)Modeling and Detection of Camouflaging Worm, , , , and . IEEE Transactions on Dependable and Secure Computing, (2010)Deploying wireless sensors to achieve both coverage and connectivity., , , , and . MobiHoc, page 131-142. ACM, (2006)Concurrent Access Control Using Subcarrier Signature in Heterogeneous MIMO-Based WLAN., , , , , and . MACOM, volume 7642 of Lecture Notes in Computer Science, page 109-121. Springer, (2012)A dynamic geographic hash table for data-centric storage in sensor networks., , , and . WCNC, page 2168-2174. IEEE, (2006)Pattern mutation in wireless sensor deployment., , , , and . IEEE/ACM Trans. Netw., 20 (6): 1964-1977 (2012)A Routing Protocol for Anycast Messages., , , and . IEEE Trans. Parallel Distributed Syst., 11 (6): 571-588 (2000)Integrated routing algorithms for anycast messages., , and . IEEE Commun. Mag., 38 (1): 48-53 (2000)Long-Term SNR Estimation Using Noise Residuals and a Two-Stage Deep-Learning Framework., and . LVA/ICA, volume 10891 of Lecture Notes in Computer Science, page 351-360. Springer, (2018)