Author of the publication

Wireless sensor networks for intrusion detection: packet traffic modeling.

, , , and . IEEE Communications Letters, 10 (1): 22-24 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

M-ary PPM UWB Radio in fading channels., , and . MWCN, World Scientific, (2003)Throughput maximization in electromagnetic energy harvesting cognitive radio sensor networks., , and . Int. J. Commun. Syst., 29 (7): 1305-1322 (2016)A Spectrum-Aware Clustering for Efficient Multimedia Routing in Cognitive Radio Sensor Networks., , , and . IEEE Trans. Veh. Technol., 63 (7): 3369-3380 (2014)Priority Scheduling for Heterogeneous Workloads: Tradeoff Between Evictions and Response Time., , and . IEEE Syst. J., 11 (2): 684-695 (2017)Scalable RFID authentication protocol based on physically unclonable functions., , and . Comput. Networks, (July 2023)A Generalized Performance Study of DS-CDMA Uplink/Downlink Receivers in NakagamiWideband Fading Channel., and . IEICE Trans. Commun., 88-B (1): 333-344 (2005)Dynamic Group Key Agreement for Resource-constrained Devices Using Blockchains., , , and . ACNS Workshops, volume 12418 of Lecture Notes in Computer Science, page 58-76. Springer, (2020)Cost-Aware Network Hardening with Limited Budget Using Compact Attack Graphs., , and . MILCOM, page 152-157. IEEE, (2014)Context and Sentiment Aware Chatbot for Tourism Applications., , , , and . SIU, page 1-4. IEEE, (2023)GPS-SEC., , and . WPNC, page 1-4. IEEE, (2016)