Author of the publication

Susceptibility Analysis of Structured P2P Systems to Localized Eclipse Attacks.

, , , and . SRDS, page 11-20. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Khelil, Abdelmajid
add a person with the name Khelil, Abdelmajid
 

Other publications of authors with the same name

TRCCIT: Tunable Reliability with Congestion Control for Information Transport in Wireless Sensor Networks., , , and . WICON, page 1-9. ICST / IEEE, (2010)Susceptibility Analysis of Structured P2P Systems to Localized Eclipse Attacks., , , and . SRDS, page 11-20. IEEE Computer Society, (2012)Sampling and transport co-design in Wireless Sensor Networks., , , and . WONS, page 98-100. IEEE, (2013)TOM: Topology oriented maintenance in sparse Wireless Sensor Networks., , , and . SECON, page 548-556. IEEE, (2011)Assessing the security of internet-connected critical infrastructures., , , , , , and . Security and Communication Networks, 7 (12): 2713-2725 (2014)Data-Based Agreement for Inter-vehicle Coordination., , , and . Mobile Data Management, page 279-280. IEEE Computer Society, (2010)Monitoring and Evaluation of Semantic Rooms., , , , , , and . Collaborative Financial Infrastructure Protection, Springer, (2012)Assessment of Model-based Methodologies to Architect Cyber-Physical Systems., and . COINS, page 146-151. ACM, (2019)Leveraging the next-generation power grid: Data sharing and associated partnerships., , , , , , and . ISGT Europe, page 1-8. IEEE, (2010)Optimized multi-attribute co-design for maximizing efficiency in Wireless Sensor Networks., , , , and . ISSNIP, page 1-6. IEEE, (2015)