Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anticipating Moves to Prevent Botnet Generated DDoS Flooding Attacks.. CoRR, (2016)Confidentiality-Aware Decision on Handoffs under Uncertainty on Heterogeneous Wireless Networks., , and . ISCC, page 884-889. IEEE, (2018)Secure On-skin Biometric Signal Transmission using Galvanic Coupling., , , , and . INFOCOM, page 1135-1143. IEEE, (2019)Mapping critical illness early signs to priority alert transmission on wireless networks., , , , and . LATINCOM, page 1-6. IEEE, (2017)A reliable and distributed time synchronization for Cognitive Radio Networks., , , and . GIIS, page 1-4. IEEE, (2012)Clustering and reliability-driven mitigation of routing attacks in massive IoT systems., , , and . J. Internet Services and Applications, 10 (1): 18:1-18:17 (2019)MPTCP robustness against large-scale man-in-the-middle attacks., , , and . Computer Networks, (2019)CD-ASM: A new queuing paradigm to overcome bufferbloat effects in HetNets., , , and . PIMRC, page 1-6. IEEE, (2017)Cryptographic Algorithms in Wearable Communications: An Empirical Analysis., , , , , and . IEEE Communications Letters, 23 (11): 1931-1934 (2019)Corrigendum to Ä framework for resilient and secure spectrum sensing on cognitive radio networks" Computer Networks volume 79 (2015) 313-322., and . Comput. Networks, (2017)