Author of the publication

A practical study on noise-tolerant PN code-based localisation attacks to internet threat monitors.

, , and . Int. J. Space Based Situated Comput., 3 (4): 215-226 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Analysis of a Defence Method against Slow HTTP DoS Attack., , , and . ISITA, page 316-320. IEEE, (2018)A Defense Method against Distributed Slow HTTP DoS Attack., , , and . NBiS, page 152-158. IEEE Computer Society, (2016)A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System., , , and . AINA, page 438-445. IEEE Computer Society, (2010)Development of Security Scanner with High Portability and Usability., , and . AINA, page 407-410. IEEE Computer Society, (2005)Development of Security Scanner with High Usability., , and . AINA (1), page 139-144. IEEE Computer Society, (2004)An Efficient RP (Rendezvous Point) Replacement Mechanism for Rendezvous-Based Multicast Routing., , and . ICDCS Workshops, page 514-518. IEEE Computer Society, (2003)EA-Epidemic: An Energy Aware Epidemic-Based Routing Protocol for Delay Tolerant Networks., and . J. Commun., 12 (6): 304-311 (2017)Vehicle-to-Vehicle Connectivity and Communication Framework for Vehicular Ad-Hoc Networks., , , and . CISIS, page 44-49. IEEE Computer Society, (2014)A flexible protocol synthesis method for adopting requirement changes., , , and . ICPADS, page 319-326. IEEE Computer Society, (1996)A Robust Energy Efficient Epidemic Routing Protocol for Delay Tolerant Networks., and . DSDIS, page 290-296. IEEE Computer Society, (2015)