Aleksandar Risteski

Orcid: 0000-0001-9485-6683

According to our database1, Aleksandar Risteski authored at least 20 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Systematic Literature Review on Blockchain-Based Systems for Academic Certificate Verification.
IEEE Access, 2023

Analysis of Blockchain Platforms for Generation and Verification of Diplomas.
Proceedings of the 12th Mediterranean Conference on Embedded Computing, 2023

Identification During Verification Of Diplomas In The Blockchain System.
Proceedings of the 30th International Conference on Systems, Signals and Image Processing, 2023

2022
Improving Energy Efficiency and Reliability in WuR-Based IoT Systems: An Error Correction Approach.
Wirel. Pers. Commun., 2022

2019
Providers and Consumers Mutual Benefits in Energy Efficiency Model with Elements of Cooperative Game Theory.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2019

Competitive Game Theory Efficiency ICT Model in MultiPlayer Market.
Proceedings of the IEEE EUROCON 2019, 2019

2017
Erratum to: Analysis of the Impact of AuthRF and AssRF Attacks on IEEE 802.11e-Based Access Point.
Mob. Networks Appl., 2017

Analysis of the Impact of AuthRF and AssRF Attacks on IEEE 802.11e-based Access Point.
Mob. Networks Appl., 2017

Security and QoS framework for 5G and next generation mobile broadband networks.
Proceedings of the IEEE EUROCON 2017 -17th International Conference on Smart Technologies, 2017

2015
Steganography in Support of the Global Terrorism.
Proceedings of the Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, 2015

Simulation Analysis of DoS, MITM and CDP Security Attacks and Countermeasures.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2015

Radio Capacity Planning in the Case of Major Incidents for Public Safety Agencies.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2015

Performance Analysis of Wireless Sensor Networks Under DDoS Attack.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2015

An Analysis of the Impact of the AuthRF and AssRF Attacks on IEEE 802.11e Standard.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2015

2014
Cyber Security Issues of Telecommunication Infrastructure.
Proceedings of the Cyber Security and Resiliency Policy Framework, 2014

Design Issues of Interoperable Communication System for Public Safety - Planning for the Unplanned.
Proceedings of the Sixth International Conference on Computational Intelligence, 2014

Power Control as an Effective Method against Low Power Jamming.
Proceedings of the Sixth International Conference on Computational Intelligence, 2014

2011
Wireless Network Behavior under ICMP Ping Flood DoS Attack and Mitigation Techniques.
Int. J. Commun. Networks Inf. Secur., 2011

2006
Criteria for optimizing laser launch conditions in 10 Gb/s links using OM3 fibers.
Telecommun. Syst., 2006

2004
Design of flexible-length S-random interleaver for turbo codes.
IEEE Commun. Lett., 2004


  Loading...