Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Depletion-of-Battery Attack: Specificity, Modelling and Analysis., and . Sensors, 18 (6): 1849 (2018)On Lightweight Method for Intrusions Detection in the Internet of Things., , , and . BlackSeaCom, page 1-5. IEEE, (2019)Toward a Lightweight Intrusion Detection System for the Internet of Things., , , and . IEEE Access, (2019)An Efficient Method for Proportional Differentiated Admission Control Implementation.. MACOM, volume 6235 of Lecture Notes in Computer Science, page 91-97. Springer, (2010)Discord Detection for a Process with a Predefined Interval of Observations., , , and . Int. J. Comput. Math., 80 (2): 181-191 (2003)An Efficient Method for Proportional Differentiated Admission Control Implementation., and . EURASIP J. Wireless Comm. and Networking, (2011)On efficiency improvement of energy harvesting wireless sensor networks.. TSP, page 56-59. IEEE, (2016)Flooding attack in energy harvesting wireless sensor networks., , and . ICUIMC, page 49. ACM, (2013)A Fast Method for Network Topology Generating., , and . MACOM, volume 8715 of Lecture Notes in Computer Science, page 96-101. Springer, (2014)An Enhanced RED-Based Scheme for Differentiated Loss Guarantees., , and . APNOMS, volume 4238 of Lecture Notes in Computer Science, page 481-490. Springer, (2006)