Author of the publication

Efficiency analysis of jamming-based countermeasures against malicious timing channel in tactical communications.

, , , and . ICC, page 4020-4024. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Service capacity in vehicular networks: A resource dissemination analysis., , , and . Ad Hoc Networks, 5 (8): 1272-1283 (2007)Opportunistic Networking as a Paradigm to Exploit Mobility., , , , and . MobiMedia, ICST, (2008)A TCP-Friendly Multicast Protocol Suite for Satellite Networks., , and . ICN (2), volume 3421 of Lecture Notes in Computer Science, page 1023-1030. Springer, (2005)A Layer-Independent Architecture for a Testing System of Protocol Implementations., , and . Protocol Specification, Testing, and Verification, page 393-406. North-Holland, (1983)On the efficiency and trustworthiness of DHT-based P2P search algorithms in mobile wireless networks., , and . ICUMT, page 1-8. IEEE, (2009)A MOS-Based Routing Approach for Wireless Mesh Networks., , , and . ICC, page 1-6. IEEE, (2011)A fuzzy decision maker for source traffic control in high speed networks., , , and . ICNP, page 136-143. IEEE Computer Society, (1995)Flow Theory: An Enhancement., , , and . ICNP, page 129-136. IEEE Computer Society, (1998)Overload throughput performance of different erasure node protocols for DQDB networks., , and . LCN, page 130-138. IEEE Computer Society, (1993)A timing channel-based MAC protocol for energy-efficient nanonetworks., , , and . Nano Commun. Networks, 6 (2): 39-50 (2015)