Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-layer TCP adaptation in DISCO for tactical edge networks., , , , , and . MILCOM, page 958-963. IEEE, (2016)Securing cognitive radio networks against belief manipulation attacks via trust management., , and . CTS, page 158-165. IEEE, (2014)Efficient Cloud-Based Real-Time Geo-Information Delivery for Mobile Users., , , , , and . MDM (1), page 251-254. IEEE Computer Society, (2015)Tactical big data analytics: challenges, use cases, and solutions., , , and . SIGMETRICS Performance Evaluation Review, 41 (4): 86-89 (2014)Airborne network evaluation: challenges and high fidelity emulation solution., , , , , , and . IEEE Communications Magazine, 52 (10): 30-36 (2014)Metrics of Security., , , , , and . Cyber Defense and Situational Awareness, volume 62 of Advances in Information Security, Springer, (2014)Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs., , and . IEEE Trans. Dependable Sec. Comput., 9 (2): 184-197 (2012)TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks., , and . EWSN, volume 5970 of Lecture Notes in Computer Science, page 65-80. Springer, (2010)SensorTrust: A resilient trust model for wireless sensing systems., , and . Pervasive and Mobile Computing, 7 (4): 509-522 (2011)From Spectrum Agility to Network Agility: Proactive and Adaptive Reconfiguration for Reliable Communication in Tactical Networks., , , , , , , , and . MILCOM, page 1663-1668. IEEE, (2013)