Author of the publication

Spatiotemporal diversification by moving-target defense through benign employment of false-data injection for dynamic, secure cognitive radio network.

, , and . J. Network and Computer Applications, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the estimation of entropy for unknown support size., and . ITW, page 522-526. IEEE, (2012)Spatiotemporal diversification by moving-target defense through benign employment of false-data injection for dynamic, secure cognitive radio network., , and . J. Network and Computer Applications, (2019)Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments., , and . TrustCom/BigDataSE, page 49-54. IEEE, (2018)Development of a New Compression Scheme., , and . NDT (1), volume 87 of Communications in Computer and Information Science, page 85-90. Springer, (2010)Repoxy: Replication Proxy for Trustworthy SDN Controller Operation., , and . TrustCom/BigDataSE, page 55-60. IEEE, (2018)The individual secrecy capacity of degraded multi-receiver wiretap broadcast channels., , and . ICC, page 4181-4186. IEEE, (2015)Systematic Design of Bandgap Voltage Reference Using Precomputed Lookup Tables., , and . IEEE Access, (2019)On the Individual Secrecy Capacity Regions of the General, Degraded, and Gaussian Multi-Receiver Wiretap Broadcast Channel., , and . IEEE Trans. Information Forensics and Security, 11 (9): 2107-2122 (2016)Fifth Generation promising integrated full loaded MIMO space-time spreading-aided-orthogonal frequency code division multiple access system., , and . IET Communications, 13 (1): 1-15 (2019)Capacity Regions for Broadcast Channels With Degraded Message Sets and Message Cognition Under Different Secrecy Constraints., , and . CoRR, (2015)