From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Routing in Socially Selfish Delay Tolerant Networks., , и . INFOCOM, стр. 857-865. IEEE, (2010)Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks., , , и . ACM Trans. Sens. Networks, 4 (4): 23:1-23:34 (2008)Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection., , , и . INFOCOM, стр. 2089-2097. IEEE, (2019)A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses., , , , и . INFOCOM, стр. 2455-2463. IEEE, (2009)Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification., и . ACM Trans. Inf. Syst. Secur., 11 (3): 15:1-15:30 (2008)On the Effectiveness of Internal Patching Against File-Sharing Worms., , и . ACNS, том 5037 из Lecture Notes in Computer Science, стр. 1-20. (2008)SET: Detecting node clones in sensor networks., , и . SecureComm, стр. 341-350. IEEE, (2007)SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks., , , и . ACM Trans. Inf. Syst. Secur., 11 (4): 18:1-18:43 (2008)SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks., , , и . MobiHoc, стр. 356-367. ACM, (2006)Self-healing wireless networks under insider jamming attacks., , , и . CNS, стр. 220-228. IEEE, (2014)