Ziaddin Daie Koozehkanani

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
To confront an attack, a good strategy may save the cost and time. When Detecting and reacting is known to handle predictable naïve attacks, prevention strategies should be used to deal with smart unknown ones. These are defined types of misbehavior in wireless MAC layer protocols. To study MAC layer misbehavior in IEEE 802.11 networks more(More)
In this paper a grid computing simulation platform, is implemented based on the OSCI TLM-2.0 standard. TLM-2.0 standard, offered as a layer on top of the System library, is becoming a key solution in system level design. The concurrency facility of TLM-2.0 on one side, and its ease of use on the other side, makes it an ideal choice for modeling and(More)
  • 1