Contradiction based gray-hole attack minimization for ad-hoc networks N Schweitzer, A Stulman, RD Margalit, A Shabtai IEEE Transactions on Mobile Computing 16 (8), 2174-2183, 2016 | 101 | 2016 |
Mitigating denial of service attacks in OLSR protocol using fictitious nodes N Schweitzer, A Stulman, A Shabtai, RD Margalit IEEE Transactions on Mobile Computing 15 (1), 163-172, 2015 | 66 | 2015 |
Meshms: Ad hoc data transfer within mesh network P Gardner-Stephen, J Lakeman, R Challans, C Wallis, A Stulman, ... Scientific Research Publishing, 2012 | 34 | 2012 |
Network bottlenecks in OLSR based ad-hoc networks N Schweitzer, A Stulman, T Hirst, RD Margalit, A Shabtai Ad Hoc Networks 88, 36-54, 2019 | 22 | 2019 |
Age replacement in the presence of inventory constraints A Mehrez, A Stulman European Journal of Operational Research 12 (2), 183-189, 1983 | 10 | 1983 |
Word embedding dimensionality reduction using dynamic variance thresholding (DyVaT) A Treistman, D Mughaz, A Stulman, A Dvir Expert Systems with Applications 208, 118157, 2022 | 9 | 2022 |
Spraying diffie-hellman for secure key exchange in manets A Stulman, J Lahav, A Shmueli Cambridge International Workshop on Security Protocols, 202-212, 2013 | 9 | 2013 |
Spraying techniques for securing key exchange in large ad-hoc networks A Stulman, A Stulman Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and …, 2015 | 7 | 2015 |
Manet secure key exchange using spraying diffie-hellman algorithm A Stulman, J Lahav, A Shmueli 2012 International Conference for Internet Technology and Secured …, 2012 | 6 | 2012 |
Another note on centralizing a multi-location one period inventory system A Mehrez, A Stulman Omega 11 (1), 104-105, 1983 | 6 | 1983 |
Identifying a malicious node in a uav network A Zilberman, A Stulman, A Dvir IEEE Transactions on Network and Service Management, 2023 | 5 | 2023 |
IoT and HIP's opportunistic mode A Fuchs, A Stulman, A Gurtov IEEE Transactions on Mobile Computing 20 (4), 1434-1448, 2020 | 5 | 2020 |
Secured by fluctuating topology using the fluctuating topology of MANETs to secure key exchange A Stulman, A Stulman Electronics 8 (10), 1172, 2019 | 5 | 2019 |
Detecting bottlenecks on-the-fly in OLSR based MANETs N Schweitzer, A Stulman, T Hirst, RD Margalit, M Armon, A Shabtai 2014 IEEE 28th Convention of Electrical & Electronics Engineers in Israel …, 2014 | 5 | 2014 |
Persuasive: A node isolation attack variant for OLSR-based MANETs and its mitigation N Schweitzer, L Cohen, A Dvir, A Stulman Ad Hoc Networks 148, 103192, 2023 | 4 | 2023 |
Authorization enforcement detection E Porat, S Tikochinski, A Stulman Proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017 | 4 | 2017 |
Searching for Optimal Homing Sequences for Testing Timed Communication Protocols. A Stulman J. Networks 4 (5), 315-323, 2009 | 3 | 2009 |
Optimal Synchronizing Sequences for Machines with Timing Constraints. A Stulman, S Bloch, HG Mendelbaum ESA 5, 27-30, 2005 | 3 | 2005 |
Optimal homing sequences for machines with timing constraints. A Stulman, S Bloch, HG Mendelbaum WSEAS Transactions on Systems 3 (9), 2793-2801, 2004 | 3 | 2004 |
On ‘an enhancement of the drezner-wesolowsky algorithm’ A Mehrez, Z Sinuany-Stern, A Stulman Journal of the Operational Research Society 43 (4), 373-374, 1992 | 3 | 1992 |