Mitko Bogdanoski

According to our database1, Mitko Bogdanoski authored at least 12 papers between 2011 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Erratum to: Analysis of the Impact of AuthRF and AssRF Attacks on IEEE 802.11e-Based Access Point.
Mob. Networks Appl., 2017

Analysis of the Impact of AuthRF and AssRF Attacks on IEEE 802.11e-based Access Point.
Mob. Networks Appl., 2017

Security and QoS framework for 5G and next generation mobile broadband networks.
Proceedings of the IEEE EUROCON 2017 -17th International Conference on Smart Technologies, 2017

2015
Steganography in Support of the Global Terrorism.
Proceedings of the Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, 2015

Simulation Analysis of DoS, MITM and CDP Security Attacks and Countermeasures.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2015

Addressing Communication Security Issues in BAN Medical System: SIARS.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2015

The Terrorist Threat to the Critical Information Infrastructure in South East Europe.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2015

An Analysis of the Impact of the AuthRF and AssRF Attacks on IEEE 802.11e Standard.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2015

2014
Cyber Security Issues of Telecommunication Infrastructure.
Proceedings of the Cyber Security and Resiliency Policy Framework, 2014

Analysis of the WSN MAC Protocols under Jamming DoS Attack.
Int. J. Netw. Secur., 2014

Power Control as an Effective Method against Low Power Jamming.
Proceedings of the Sixth International Conference on Computational Intelligence, 2014

2011
Wireless Network Behavior under ICMP Ping Flood DoS Attack and Mitigation Techniques.
Int. J. Commun. Networks Inf. Secur., 2011


  Loading...