Author of the publication

Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications.

, , , and . Ad Hoc Networks, 7 (8): 1489-1500 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Worm Propagation Dynamics in Wireless Sensor Networks., , and . ICC, page 1541-1545. IEEE, (2008)Designing a Practical Access Point Association Protocol., , , , and . INFOCOM, page 1361-1369. IEEE, (2010)The Rise of Social Botnets: Attacks and Countermeasures., , , and . IEEE Trans. Dependable Sec. Comput., 15 (6): 1068-1082 (2018)VirusMeter: Preventing Your Cellphone from Spies., , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 244-264. Springer, (2009)Mobi-watchdog: you can steal, but you can't run!, , and . WISEC, page 139-150. ACM, (2009)Sim-Watchdog: Leveraging Temporal Similarity for Anomaly Detection in Dynamic Graphs., and . ICDCS, page 154-165. IEEE Computer Society, (2014)Malware propagation in online social networks: nature, dynamics, and defense implications., , , and . AsiaCCS, page 196-206. ACM, (2011)Measuring the effectiveness of infrastructure-level detection of large-scale botnets., , , and . IWQoS, page 1-9. IEEE, (2011)Be Sensitive to Your Errors: Chaining Neyman-Pearson Criteria for Automated Malware Classification.. AsiaCCS, page 121-132. ACM, (2015)SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput., , , , , and . IEEE Trans. Parallel Distributed Syst., 24 (12): 2482-2491 (2013)