From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On cellular network planning and operation with M2M signalling and security considerations., , , и . ICC Workshops, стр. 429-434. IEEE, (2014)Automated device for determination of skin lesion regions., , , и . SAC, стр. 859-860. ACM, (2009)EmuNET: a real-time network emulator., и . SAC, стр. 357-362. ACM, (2004)Identity Based Key Distribution Framework for Link Layer Security of AMI Networks., , , и . IEEE Trans. Smart Grid, 9 (4): 3166-3179 (2018)A resource reservation attack against LTE networks., , , и . ICCIT, стр. 262-268. IEEE, (2013)Virtualized network views for localizing misbehaving sources in SDN data planes., , , и . ICC, стр. 1-7. IEEE, (2017)A design methodology for energy aware neural networks., , , , , и . IWCMC, стр. 1333-1340. IEEE, (2011)An enterprise policy-based security protocol for protecting relational database network objects., , и . IWCMC, стр. 343-348. ACM, (2006)Proactive channel allocation for multimedia applications over CSMA/CA-based CRNs., , , , и . ACTEA, стр. 178-183. IEEE, (2016)Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices., , и . SecureComm, стр. 240-242. IEEE, (2005)