From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security in Ad Hoc Networks: From Vulnerability to Risk Management., , и . SECURWARE, стр. 203-209. IEEE Computer Society, (2009)An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks., , и . ICNSC, стр. 366-371. IEEE, (2010)Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme., , , и . ARES, стр. 636-641. IEEE Computer Society, (2008)A Survey on Trust and Reputation Schemes in Ad Hoc Networks., , , и . ARES, стр. 881-886. IEEE Computer Society, (2008)Lifetime Optimization in Hierarchical Wireless Sensor Networks., , , и . ETFA, стр. 1-8. IEEE, (2009)Threshold Cryptography and Authentication in Ad Hoc Networks Survey and Challenges., , и . ICSNC, стр. 5. IEEE Computer Society, (2007)Coarse spectrum sensing for LTE systems., , , и . ICT, стр. 116-121. IEEE, (2010)Interference Mitigation in D2D Communications for 5G Mobile Networks., , , , и . ECAI, стр. 1-6. IEEE, (2021)Cooperative Defense Firewall Protocol., и . SEC, том 250 из IFIP Conference Proceedings, стр. 373-384. Kluwer, (2003)Certification and Revocation Schemes in Ad Hoc Networks Survey and Challenges., , и . ICSNC, стр. 17. IEEE Computer Society, (2007)