Search for persons
X
?
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
1
Trustworthiness and Subversion in Large Service-Oriented Mu..:
, In:
?
2020 30th International Telecommunication Networks and Applications Conference (ITNAC) ,
4
Mitigation of Fake Data Content Poisoning Attacks in NDN vi..:
, In:
?
Ad Hoc Networks; Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ,
5
Guessing Intrinsic Forwarding Trustworthiness of Wireless A..:
, In:
?
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) ,
6
Mitigating Time-Constrained Stolen-Credentials Content Pois..:
, In:
?
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies ,
11
DRinK : a defense strategy of cooperative wireless termi..:
, In:
?
13
Wireless and Mobile Networking
Second IFIP WG 6.8 Joint Conference, WMNC 2009, Gdańsk, Po...
IFIP Advances in Information and Communication Technology ; 308;SpringerLink, Bücher;Springer eBook Collection, Computer Science
?
Wireless and Mobile Networking; IFIP Advances in Information and Communication Technology ,
14
DST-Based Detection of Non-cooperative Forwarding Behavior ..:
, In:
?
Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems ,
15