Author of the publication

Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing.

, , , and . IEEE Trans. Mob. Comput., 14 (11): 2392-2405 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance analysis of the interactivity for multicast true VoD service., and . ICCCN, page 535-538. IEEE, (2001)Effects of electromagnetic interference on controller-computer upsets and system stability., , and . IEEE Trans. Contr. Sys. Techn., 8 (2): 351-357 (2000)Reconfigurable Software for Open Architecture Controllers., and . ICRA, page 4090-4095. IEEE, (2001)LinkDroid: Reducing Unregulated Aggregation of App Usage Behaviors., , and . USENIX Security Symposium, page 769-783. USENIX Association, (2015)Deadlock-Free Fault-Tolerant Routing in Injured Hypercubes., and . IEEE Trans. Computers, 42 (9): 1078-1088 (1993)Execution Time Analysis of Communicating Tasks in Distributed Systems., and . IEEE Trans. Computers, 45 (5): 572-579 (1996)Workload Effects on Fault Latency for Real-Time Computing Systems., and . RTSS, page 188-197. IEEE Computer Society, (1987)A distributed route-selection scheme for establishing real-time channels., and . HPN, volume 29 of IFIP Conference Proceedings, page 319-330. Chapman & Hall, (1995)Robust TCP congestion recovery., and . J. High Speed Networks, 13 (2): 103-121 (2004)Opportunistic Access of TV Spectrum Using Cognitive-Radio-Enabled Cellular Networks., and . IEEE Trans. Vehicular Technology, 60 (8): 3853-3864 (2011)