Author of the publication

Malicious attacks in Mobile Device Clouds: A data driven risk assessment.

, , and . ICCCN, page 1-8. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exact Outage Analysis of Dual-Hop Fixed-Gain AF Relaying with CCI under Dissimilar Nakagami-m Fading., , , , and . IEEE Communications Letters, 16 (11): 1756-1759 (2012)Erasure-Coding Based Dissemination Protocol for Mobile Clouds., , and . 3PGCIC, page 416-421. IEEE, (2013)A generalized analytical model for contention-based access in IEEE 802.16 wireless networks., and . PIMRC, page 1463-1468. IEEE, (2010)Batch scheduling algorithms: a class of wavelength schedulers in optical burst switching networks., and . ICC, page 1713-1719. IEEE, (2005)Performance Analysis of Dual-Hop AF Systems in Nakagami-m Fading Channels in the Presence of Interference., , , , and . ICC, page 1-5. IEEE, (2011)Traffic engineering with distributed dynamic channel allocation in BFWA mesh networks at millimeter wave band., and . LANMAN, IEEE, (2005)MPEG-4 broadcast: a client/server framework for multi-service streaming using push channels., and . MMSP, page 543-548. IEEE, (2001)A Fast Reconfigurable Network for Graph Connectivity and Transitive Closure.. Parallel Processing Letters, (1994)A Network-Coding Based Event Diffusion Protocol for Wireless Mesh Networks., and . Autonomics, volume 23 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 17-31. Springer, (2009)Robust Layered Transmission in Secure MISO Multiuser Unicast Cognitive Radio Systems., , , and . CoRR, (2014)