Joseph Soryal

According to our database1, Joseph Soryal authored at least 9 papers between 2012 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Countermeasure technique to combat greedy behavior in ad-hoc wireless networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Smart Grid DNP3 Vulnerability Analysis and Experimentation.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
IEEE 802.11 DoS attack detection and mitigation utilizing Cross Layer Design.
Ad Hoc Networks, 2014

Power-Aware Architecture to Combat Intelligent Adaptive Attacks in Ad-Hoc Wireless Networks.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2014

Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Misbehavior detection and isolation in peer-to-peer networks with the presence of hidden nodes.
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013

DoS attack detection in Internet-connected vehicles.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013

2012
IEEE 802.11 Denial of Service attack detection in MANET.
Proceedings of the 2012 Wireless Telecommunications Symposium, 2012

Byzantine Attack Isolation in IEEE 802.11 Wireless Ad-Hoc Networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012


  Loading...