From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analytic models for the latency and steady-state throughput of TCP tahoe, Reno, and SACK., , и . IEEE/ACM Trans. Netw., 11 (6): 959-971 (2003)PLAKE: PUF-Based Secure Lightweight Authentication and Key Exchange Protocol for IoT., , , , , и . IEEE Internet Things J., 10 (10): 8547-8559 (мая 2023)Guest Editorial: Security and Privacy in 5G-Enabled Industrial IoT Current Progress and Future Challenges., , и . IEEE Trans. Ind. Informatics, 19 (1): 867-869 (2023)Scaling of Spatial Reuse and Saturation Throughput in a Class of MAC Protocols., , и . IEEE Trans. Wirel. Commun., 6 (10): 3529-3533 (2007)Classification and Detection of PMU Data Manipulation Attacks Using Transmission Line Parameters., , и . IEEE Trans. Smart Grid, 9 (5): 5057-5066 (2018)Unified Detection of Attacks Involving Injection of False Control Commands and Measurements in Transmission Systems of Smart Grids., и . IEEE Trans. Smart Grid, 13 (2): 1598-1610 (2022)PREVENT: A Mechanism for Preventing Message Tampering Attacks in Electric Vehicle Networks., , и . VTC2023-Spring, стр. 1-5. IEEE, (2023)A Blockchain and Machine Learning based Framework for Efficient Health Insurance Management., , , и . SenSys, стр. 511-515. ACM, (2021)Fault Resilient Authentication Architecture for Drone Networks., и . ICC Workshops, стр. 866-871. IEEE, (2022)Throughput Guarantee for Maximal Schedulers in Sensor Networks with Cooperative Relays., и . IEEE Trans. Commun., 59 (12): 3265-3271 (2011)