Author of the publication

Jamming and advanced modular-based blind rendezvous algorithms for Cognitive Radio Networks.

, and . WoWMoM, page 1-10. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Priority inversion and queue management for 802.11 priority WLANs., and . CCNC, page 565-573. IEEE, (2013)Rapid simulation and software prototyping for the architectural design of embedded multiprocessor systems.. ACM Conference on Computer Science, page 113-121. ACM, (1991)New strategies for complete game trees., and . ACM Conference on Computer Science, page 408. ACM, (1989)Integrating Rate-Monotonic Analysis into Real-Time Software Development., , and . Diffusion, Transfer and Implementation of Information Technology, volume A-45 of IFIP Transactions, page 257-274. Elsevier, (1993)Channel Detecting Jamming Attacks against Jump-Stay Based Channel Hopping Rendezvous Algorithms for Cognitive Radio Networks., and . ICCCN, page 1-9. IEEE, (2013)Beyond minimaxing for games with draws., and . ACM Conference on Computer Science, page 551-557. ACM, (1991)Sequence sensing Jamming attacks against modular-based channel hopping rendezvous algorithms for cognitive ratio networks., and . ICC, page 2171-2176. IEEE, (2013)Dynamic Localization Schemes in Malicious Sensor Networks., and . J. Networks, 4 (8): 677-686 (2009)Limitations of Quorum-based Rendezvous and key establishment schemes against sophisticated jamming attacks., and . MILCOM, page 1-6. IEEE, (2012)Efficient Localization Schemes in Sensor Networks with Malicious Nodes., and . SECRYPT, page 190-196. INSTICC Press, (2008)