Author of the publication

Novel access and remediation scheme in hierarchical trusted network.

, , and . Computer Communications, 34 (3): 375-383 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic entropy based DoS attack detection method., , , and . Computers & Electrical Engineering, 39 (7): 2243-2251 (2013)A Novel Planar IPPCT Tree Structure and Characteristics Analysis., , and . JSW, 5 (3): 344-351 (2010)Modeling Cascading Failures in Congested Internet., , , and . ICYCS, page 1499-1504. IEEE Computer Society, (2008)A Modified Chicken Swarm Optimization Algorithm for Synthesizing Linear, Circular and Random Antenna Arrays., , , , , and . VTC-Fall, page 1-7. IEEE, (2019)Detecting Community Structures Based on an Improved Discrete Bat Algorithm., , , and . VTC-Fall, page 1-6. IEEE, (2019)Multi-objective optimization for distributed collaborative beamforming in mobile wireless sensor networks., , , , , and . ISCC, page 752-758. IEEE, (2018)Network-layer abstraction and simulation of vehicle communication stack., , , and . Wireless Networks, 21 (3): 709-725 (2015)SAV4AV: securing authentication and verification for ad hoc vehicles., , , , and . Security and Communication Networks, 8 (4): 626-636 (2015)The Joint Adaptive Kalman Filter (JAKF) for Vehicle Motion State Estimation., , , , and . Sensors, 16 (7): 1103 (2016)Model for router-level internet topology based on attribute evolution., , , and . IEEE Communications Letters, 13 (6): 447-449 (2009)