Author of the publication

Freedom of speech: thwarting jammers via a probabilistic approach.

, and . WISEC, page 4:1-4:6. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GPU Algorithms for K-Anonymity in Microdata., , , and . CNS, page 1-9. IEEE, (2019)Detecting Drones Status via Encrypted Traffic Analysis., , , and . WiseML@WiSec, page 67-72. ACM, (2019)Mapping the File Systems Genome: rationales, technique, results and applications., , , and . CoRR, (2013)RFID security and privacy: long-term research or short-term tinkering?, , , , , , and . WISEC, page 160. ACM, (2008)Evaluating the Risk of Adopting RBAC Roles., , , and . DBSec, volume 6166 of Lecture Notes in Computer Science, page 303-310. Springer, (2010)Drive me not: GPS spoofing detection via cellular network: (architectures, models, and experiments)., , , and . WiSec, page 12-22. ACM, (2019)A formal framework to elicit roles with business meaning in RBAC systems., , , and . SACMAT, page 85-94. ACM, (2009)Sensor Networks that Are Provably Resilient., , , , and . SecureComm, page 1-10. IEEE, (2006)Emergent properties: detection of the node-capture attack in mobile wireless sensor networks., , , and . WISEC, page 214-219. ACM, (2008)VISIO: A Visual Approach for Singularity Detection in Recommendation Systems., , , and . TrustBus, volume 9264 of Lecture Notes in Computer Science, page 33-47. Springer, (2015)