Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks., , and . GLOBECOM, page 1-5. IEEE, (2010)An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks., , and . INFOCOM, page 1586-1594. IEEE, (2010)Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks., , and . GLOBECOM, page 1-5. IEEE, (2010)DISPERSE: A Decentralized Architecture for Content Replication Resilient to Node Failures., , , , , and . IEEE Trans. Network and Service Management, 17 (1): 201-212 (2020)Is Channel Fragmentation/bonding in IEEE 802.22 Networks Secure?, , , and . ICC, page 1-5. IEEE, (2011)On the Secrecy Capacity of Fading Cognitive Wireless Networks., and . CrownCom, page 1-5. IEEE, (2008)NEAT: A NEighbor AssisTed spectrum decision protocol for resilience against PUEA., , , and . CNS, page 44-52. IEEE, (2014)Estimation of missing RTTs in computer networks: Matrix completion vs compressed sensing., , and . Comput. Networks, 55 (15): 3364-3375 (2011)A Game-Theoretic Analysis of Competitive Editing in Wikipedia: Contributors' Effort to Influence Articles and the Community's Attempt to Ensure Neutrality., , , and . CoRR, (2021)Cost of Collaboration vs Individual Effort in Social Networks., , and . SDM, page 403-413. SIAM / Omnipress, (2011)