Author of the publication

Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks.

, , , and . Ad Hoc & Sensor Wireless Networks, 17 (1-2): 87-102 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting rogue devices in bluetooth networks using radio frequency fingerprinting., , and . Communications and Computer Networks, page 108-113. IASTED/ACTA Press, (2006)An approach to conformance testing of MIB implementations., and . Integrated Network Management, volume 11 of IFIP Conference Proceedings, page 654-665. Chapman & Hall, (1995)Insider attack attribution using signal strength-based hyperbolic location estimation., and . Security and Communication Networks, 1 (4): 337-349 (2008)Planning Control Rules for Reactive Agents., , and . Artif. Intell., 95 (1): 67-11 (1997)Simulation and modeling of hydro acoustic communication channels with wide band attenuation and ambient noise., , , , and . IJPEDS, 32 (5): 466-485 (2017)Next Generation Resilient Cyber-Physical Systems., , , and . CoRR, (2019)Extension of the Karp and Miller Procedure to Lotos Specifications., and . CAV, volume 531 of Lecture Notes in Computer Science, page 333-342. Springer, (1990)Probabilistic Evidence Aggregation for Malicious Node Position Bounding in Wireless Networks., and . JNW, 4 (1): 9-18 (2009)FTAM Test Design Using an Automated Test Tool., , , and . INFOCOM, page 251-260. IEEE Computer Society, (1989)Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks., and . WASA, volume 5682 of Lecture Notes in Computer Science, page 358-367. Springer, (2009)