Author of the publication

Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities.

, , , , , and . IEEE Trans. Vehicular Technology, 63 (8): 3867-3874 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guest editorial: 3G wireless and beyond., and . Computer Communications, 26 (17): 1905-1906 (2003)A Code Assignment Algorithm for Nonblocking OVSF Codes in WCDMA., and . Telecommunication Systems, 25 (3-4): 417-431 (2004)Alert Data Aggregation and Transmission Prioritization over Mobile Networks., , and . Network Science and Cybersecurity, volume 55 of Advances in Information Security, Springer, (2014)Risk-driven aggregation and transmission prioritization of cyber alerts over mobile networks., and . ICNC, page 58-62. IEEE, (2014)A distributed dynamic channel and packet assignment for wireless multimedia traffic.. WCNC, page 1131-1135. IEEE, (2000)Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities., , , , , and . IEEE Trans. Vehicular Technology, 63 (8): 3867-3874 (2014)On simulation studies of jamming threats against LTE networks., , , , , and . ICNC, page 99-103. IEEE Computer Society, (2015)Balanced permutations and multistage interconnection networks.. Int. J. Comput. Math., 73 (1): 125-137 (1999)Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks., and . IEEE/ACM Trans. Netw., 18 (3): 736-749 (2010)Optimizing Alert Data Management Processes at a Cyber Security Operations Center., , , and . Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, volume 11830 of Lecture Notes in Computer Science, Springer, (2019)