Author of the publication

Statistical delay control of opportunistic links in cognitive radio networks.

, , , and . PIMRC, page 2250-2254. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On exploiting SDN to facilitate IPv4/IPv6 coexistence and transition., , , and . DSC, page 473-474. IEEE, (2017)Duality on timing alignment and radio resources orthogonality toward 5G heterogeneous networks., , and . VITAE, page 1-5. IEEE, (2014)Retransmission-Based Access Class Barring for Machine Type Communications., , and . IoTaaS, volume 246 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 145-154. Springer, (2017)IoT Malware Detection Using Function-Call-Graph Embedding., , , , and . PST, page 1-9. IEEE, (2021)Ecology-Based DoS Attack in Cognitive Radio Networks., and . IEEE Symposium on Security and Privacy Workshops, page 104-110. IEEE Computer Society, (2016)Energy-Efficient BLE Device Discovery for Internet of Things., , and . CANDAR, page 75-79. IEEE Computer Society, (2017)A Highly Scalable Automated Universal Binary Malware Analysis Framework for Healthcare and Medical SaaS., , , , , and . ICMHI, page 102-107. ACM, (2024)Firmulti Fuzzer: Discovering Multi-process Vulnerabilities in IoT Devices with Full System Emulation and VMI., and . CPSIOTSEC@CCS, page 1-9. ACM, (2023)An Empirical Evaluation of Bluetooth-based Decentralized Contact Tracing in Crowds., , , , , , , , and . CoRR, (2020)ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures., , , , and . SP (Workshops), page 126. IEEE, (2020)