Author of the publication

Detecting Wormhole Attacks in Wireless Sensor Networks.

, , , and . Critical Infrastructure Protection, volume 253 of IFIP, page 267-279. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of a Location-Based Social Network., and . CSE (4), page 263-270. IEEE Computer Society, (2009)A Toolkit for Usability Testing of Mobile Applications., , , , , and . MobiCASE, volume 95 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 226-245. Springer, (2011)Measurement study on wireless camera networks., , and . ICDSC, page 1-10. IEEE, (2008)Design and Implementation of a Large-Scale Context Fusion Network., , and . MobiQuitous, page 246-255. IEEE Computer Society, (2004)Context Aggregation and Dissemination in Ubiquitous Computing Systems., and . WMCSA, page 105-. IEEE Computer Society, (2002)Sniffer Channel Selection for Monitoring Wireless LANs., , , , and . WASA, volume 5682 of Lecture Notes in Computer Science, page 489-498. Springer, (2009)Sniffer channel selection for monitoring wireless LANs., , , , , and . Computer Communications, 35 (16): 1994-2003 (2012)DeepFood: Deep Learning-Based Food Image Recognition for Computer-Aided Dietary Assessment., , , , , and . ICOST, volume 9677 of Lecture Notes in Computer Science, page 37-48. Springer, (2016)Respiratory Sounds Feature Learning with Deep Convolutional Neural Networks., , , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 170-177. IEEE Computer Society, (2017)CrowdRecruiter: selecting participants for piggyback crowdsensing under probabilistic coverage constraint., , , and . UbiComp, page 703-714. ACM, (2014)