Seguir
Ariel Stulman
Ariel Stulman
Jerusalem College of Technology
E-mail confirmado em jct.ac.il - Página inicial
Título
Citado por
Citado por
Ano
Contradiction based gray-hole attack minimization for ad-hoc networks
N Schweitzer, A Stulman, RD Margalit, A Shabtai
IEEE Transactions on Mobile Computing 16 (8), 2174-2183, 2016
922016
Mitigating denial of service attacks in OLSR protocol using fictitious nodes
N Schweitzer, A Stulman, A Shabtai, RD Margalit
IEEE Transactions on Mobile Computing 15 (1), 163-172, 2015
662015
Meshms: Ad hoc data transfer within mesh network
P Gardner-Stephen, J Lakeman, R Challans, C Wallis, A Stulman, ...
Scientific Research Publishing, 2012
332012
Network bottlenecks in OLSR based ad-hoc networks
N Schweitzer, A Stulman, T Hirst, RD Margalit, A Shabtai
Ad Hoc Networks 88, 36-54, 2019
232019
Age replacement in the presence of inventory constraints
A Mehrez, A Stulman
European Journal of Operational Research 12 (2), 183-189, 1983
101983
Spraying diffie-hellman for secure key exchange in manets
A Stulman, J Lahav, A Shmueli
Cambridge International Workshop on Security Protocols, 202-212, 2013
92013
Spraying techniques for securing key exchange in large ad-hoc networks
A Stulman, A Stulman
Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and …, 2015
72015
Manet secure key exchange using spraying diffie-hellman algorithm
A Stulman, J Lahav, A Shmueli
2012 International Conference for Internet Technology and Secured …, 2012
62012
Another note on centralizing a multi-location one period inventory system
A Mehrez, A Stulman
Omega 11 (1), 104-105, 1983
61983
Secured by fluctuating topology using the fluctuating topology of MANETs to secure key exchange
A Stulman, A Stulman
Electronics 8 (10), 1172, 2019
52019
Detecting bottlenecks on-the-fly in OLSR based MANETs
N Schweitzer, A Stulman, T Hirst, RD Margalit, M Armon, A Shabtai
2014 IEEE 28th Convention of Electrical & Electronics Engineers in Israel …, 2014
52014
IoT and HIP's opportunistic mode
A Fuchs, A Stulman, A Gurtov
IEEE Transactions on Mobile Computing 20 (4), 1434-1448, 2020
42020
Authorization enforcement detection
E Porat, S Tikochinski, A Stulman
Proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017
42017
Optimal Synchronizing Sequences for Machines with Timing Constraints.
A Stulman, S Bloch, HG Mendelbaum
ESA 5, 27-30, 2005
32005
Optimal homing sequences for machines with timing constraints.
A Stulman, S Bloch, HG Mendelbaum
WSEAS Transactions on Systems 3 (9), 2793-2801, 2004
32004
On ‘an enhancement of the drezner-wesolowsky algorithm’
A Mehrez, Z Sinuany-Stern, A Stulman
Journal of the Operational Research Society 43 (4), 373-374, 1992
31992
Persuasive: A node isolation attack variant for OLSR-based MANETs and its mitigation
N Schweitzer, L Cohen, A Dvir, A Stulman
Ad Hoc Networks 148, 103192, 2023
22023
Word embedding dimensionality reduction using dynamic variance thresholding (DyVaT)
A Treistman, D Mughaz, A Stulman, A Dvir
Expert Systems with Applications 208, 118157, 2022
22022
Hardening opportunistic HIP
A Fuchs, A Stulman, A Gurtov
Proceedings of the 20th ACM International Conference on Modelling, Analysis …, 2017
22017
Neighbor contamination to achieve complete bottleneck control
N Schweitzer, A Stulman, A Shabtai
Proceedings of the 19th ACM International Conference on Modeling, Analysis …, 2016
22016
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20