Author of the publication

Mitigation of the Spectrum Sensing Data Falsifying Attack in Cognitive Radio Networks.

, , and . ICC, page 1-6. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Compromised Sensor Nodes in Heterogeneous Sensor Networks.. ICC, page 1446-1450. IEEE, (2008)VDAS: Verifiable Data Aggregation Scheme for Internet of Things., , , , and . CoRR, (2018)LRCoin: Leakage-resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT., , , , , and . CoRR, (2018)Glaucus: Predicting Computing-Intensive Program's Performance for Cloud Customers., , , , and . ICIC (1), volume 7995 of Lecture Notes in Computer Science, page 285-294. Springer, (2013)Improving QoS on high-speed vehicle by multipath transmission based on practical experiment., , , and . VNC, page 32-35. IEEE, (2015)A Visible Light Channel Based Access Control Scheme for Wireless Insulin Pump Systems., , , , and . ICC, page 1-6. IEEE, (2018)An Efficient Anonymous Authentication Scheme for Internet of Vehicles., , , , and . ICC, page 1-6. IEEE, (2018)A Low-Overhead Kernel Object Monitoring Approach for Virtual Machine Introspection., , , , , and . ICC, page 1-6. IEEE, (2019)Density-Varying High-End Sensor Placement in Heterogeneous Wireless Sensor Networks., , and . ICC, page 1-6. IEEE, (2009)A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks., , , , and . ICC, page 3407-3412. IEEE, (2007)