Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight energy consumption-based intrusion detection system for wireless sensor networks., , , and . Int. J. Inf. Sec., 14 (2): 155-167 (2015)M^2 DR: A Near-optimal Multiclass Minimum-delay Routing Algorithm for Smart Radio Access Networks., , , , , and . LCN, page 366-373. IEEE Computer Society, (2005)AntSec, WatchAnt, and AntRep: Innovative Security Mechanisms for Wireless Mesh Networks., , , and . LCN, page 539-547. IEEE Computer Society, (2007)Protecting IEEE 802.11s wireless mesh networks against insider attacks., , , , and . LCN, page 224-227. IEEE Computer Society, (2012)Per-flow guarantees under class-based priority queueing., , , and . GLOBECOM, page 4169-4174. IEEE, (2003)Modeling of Self-Organizing Systems., , , and . Praxis der Informationsverarbeitung und Kommunikation, 31 (1): 2-3 (2008)Node selection for corridor-based routing in OFDMA multihop networks., , , and . WCNC, page 2040-2045. IEEE, (2013)Privacy-Preserving Collaborative Path Hiding for Participatory Sensing Applications., , , , and . MASS, page 341-350. IEEE Computer Society, (2011)A rapid prototyping framework for practical OFDMA systems using Software Defined Radios., , and . SECON, page 433-441. IEEE, (2013)Measuring the impact of denial-of-service attacks on wireless sensor networks., , and . LCN, page 296-304. IEEE Computer Society, (2014)