Rohit Negi
First Name: Rohit Last Name: Negi Professional Title: Professor Organization: Carnegie-Mellon University
View ArticleDanda Rawat
First Name: Danda Middle Initial: B Last Name: Rawat Organization: GSU Contact InformationStreet Address: PO Box 8045, 1332 Southern Drive City: Statesboro Zip Code: 30460
View ArticleKapil Dandekar
First Name: Kapil Last Name: Dandekar Professional Title: Professor, Associate Dean for Research and Graduate Studies Organization: Drexel University
View ArticleM2M technologies: Enablers for a pervasive Internet of Things
Severi, S., Sottile, F., Abreu, G., Pastrone, C., Spirito, M., Berens, F.. 2014. M2M technologies: Enablers for a pervasive Internet of Things. Networks and Communications (EuCNC), 2014 European...
View ArticlePhysical layer authentication based on channel response tracking using...
Van Vaerenbergh, S., González, O., Vía, J., Santamaría, I.. 2014. Physical layer authentication based on channel response tracking using Gaussian processes. Acoustics, Speech and Signal Processing...
View ArticlePhysical layer authentication based on channel response tracking using...
Van Vaerenbergh, S., González, O., Vía, J., Santamaría, I.. 2014. Physical layer authentication based on channel response tracking using Gaussian processes. Acoustics, Speech and Signal Processing...
View ArticleRohit Negi
First Name: Rohit Last Name: Negi Professional Title: Professor Organization: Carnegie-Mellon University
View ArticleDanda Rawat
First Name: Danda Middle Initial: B Last Name: Rawat Professional Title: Associate Professor Organization: Howard University Contact InformationCity: WASHINGTON Zip Code: 20059
View ArticleKapil Dandekar
First Name: Kapil Last Name: Dandekar Professional Title: Professor, Associate Dean for Research and Graduate Studies Organization: Drexel University
View ArticleM2M technologies: Enablers for a pervasive Internet of Things
Severi, S., Sottile, F., Abreu, G., Pastrone, C., Spirito, M., Berens, F.. 2014. M2M technologies: Enablers for a pervasive Internet of Things. Networks and Communications (EuCNC), 2014 European...
View ArticlePhysical layer authentication based on channel response tracking using...
Van Vaerenbergh, S., González, O., Vía, J., Santamaría, I.. 2014. Physical layer authentication based on channel response tracking using Gaussian processes. Acoustics, Speech and Signal Processing...
View ArticlePhysical layer authentication based on channel response tracking using...
Van Vaerenbergh, S., González, O., Vía, J., Santamaría, I.. 2014. Physical layer authentication based on channel response tracking using Gaussian processes. Acoustics, Speech and Signal Processing...
View Article"An integrated signaling-encryption mechanism to reduce error propagation in...
M. M. Olama, M. M. Matalgah, M. Bobrek. 2015. "An integrated signaling-encryption mechanism to reduce error propagation in wireless communications: performance analyses". 2015 IEEE International...
View ArticleIdentifying interdependencies using attack graph generation methods
Lever, K. E., Kifayat, K., Merabti, M.. 2015. Identifying interdependencies using attack graph generation methods. 2015 11th International Conference on Innovations in Information Technology (IIT)....
View ArticleDINWC2018
The Sixth International Conference on Digital Information, Networking, and Wireless Communications (DINWC2018)Faculty of Engineering, Lebanese University, Beirut, Lebanon April 25-27, 2018...
View ArticleApply a wireless line sensor system to enhance distribution protection schemes
Hao, K., Achanta, S. V., Fowler, J., Keckalo, D.. 2017. Apply a wireless line sensor system to enhance distribution protection schemes. 2017 70th Annual Conference for Protective Relay Engineers...
View ArticleAdaptable Safety and Security in V2X Systems
Villarreal-Vasquez, M., Bhargava, B., Angin, P.. 2017. Adaptable Safety and Security in V2X Systems. 2017 IEEE International Congress on Internet of Things (ICIOT). :17–24.
View ArticleContext-Aware Authorization and Anonymous Authentication in Wireless Body...
Arfaoui, A., Kribeche, A., Boudia, O. R. M., Letaifa, A. Ben, Senouci, S. M., Hamdi, M.. 2018. Context-Aware Authorization and Anonymous Authentication in Wireless Body Area Networks. 2018 IEEE...
View ArticleAn Improved Cooperative Cell Outage Detection in Self-Healing Het Nets Using...
Broomandi, Fateme, Ghasemi, Abdorasoul. 2019. An Improved Cooperative Cell Outage Detection in Self-Healing Het Nets Using Optimal Cooperative Range. 2019 27th Iranian Conference on Electrical...
View ArticleAsymmetric Physical Layer Encryption for Wireless Communications
Li, Wei, Mclernon, Des, Wong, Kai-Kit, Wang, Shilian, Lei, Jing, Zaidi, Syed Ali Raza. 2019. Asymmetric Physical Layer Encryption for Wireless Communications. IEEE Access. 7:46959–46967.
View Article