Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Quality of VoIP Streams over WiMax., , and . IEEE Trans. Computers, 57 (2): 145-156 (2008)A Game Theoretic Framework for Power Control in Wireless Sensor Networks., , and . IEEE Trans. Computers, 59 (2): 231-242 (2010)Implementation of interface agility for duplex dynamic spectrum access radio using USRP., and . MILCOM, page 762-767. IEEE, (2017)Performance Modeling of Multi-Rate HDR and its Effect on TCP Throughput., , and . ICC, page 5206-5211. IEEE, (2007)Understanding the feasibility of machine learning algorithms in a game theoretic environment for dynamic spectrum access., and . SPECTS, page 1-8. IEEE, (2017)Attribute based sharing in cybersecurity information exchange framework., , and . SPECTS, page 1-6. IEEE, (2017)Implementation of 3D Obstacle Compliant Mobility Models for UAV Networks in ns-3., , and . WNS3, page 124-131. ACM, (2016)Finding the Sweet Spot for Data Anonymization: A Mechanism Design Perspective., , , and . CoRR, (2021)Lost at Sea: Assessment and Evaluation of Rootkit Attacks on Shipboard Microgrids., , , and . CoRR, (2023)Cybersecurity Information Exchange with Privacy (CYBEX-P) and TAHOE - A Cyberthreat Language., , , , , , , , , and . CoRR, (2021)