Author of the publication

A comparative study of congestion control algorithms in IPv6 Wireless Sensor Networks.

, , , and . DCOSS, page 1-6. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks., , and . WISTP, volume 7886 of Lecture Notes in Computer Science, page 34-49. Springer, (2013)An emulator for the network stack of Integrated Modular Systems., , , and . SoSE, page 1-6. IEEE, (2010)Managing cyber security risks in industrial control systems with game theory and viable system modelling., , , , and . SoSE, page 266-271. IEEE, (2014)A pilot study on the security of pattern screen-lock methods and soft side channel attacks., , , and . WISEC, page 1-6. ACM, (2013)Experiences from porting the Contiki operating system to a popular hardware platform., and . DCOSS, page 1-6. IEEE Computer Society, (2011)Microsecond-Accuracy Time Synchronization Using the IEEE 802.15.4 TSCH Protocol., , , , , and . LCN Workshops, page 156-164. IEEE Computer Society, (2016)ADDER: Probabilistic, Application Layer Service Discovery for MANETs and Hybrid Wired-Wireless Networks., , , and . CNSR, page 33-40. IEEE Computer Society, (2011)Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method., , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 115-126. Springer, (2014)Class Based Overall Priority Scheduling for M2M Communications over LTE Networks., , , , and . VTC Spring, page 1-5. IEEE, (2015)Forensic analysis of wireless networking evidence of Android smartphones., , and . WIFS, page 109-114. IEEE, (2012)