V
Vojislav B. Misic
Researcher at Ryerson University
Publications - 345
Citations - 4417
Vojislav B. Misic is an academic researcher from Ryerson University. The author has contributed to research in topics: Wireless sensor network & Computer science. The author has an hindex of 32, co-authored 312 publications receiving 3760 citations. Previous affiliations of Vojislav B. Misic include University of Belgrade & University of Winnipeg.
Papers
More filters
Journal ArticleDOI
Two-hop communications in a cognitive radio network
TL;DR: An efficient bridging protocol for interconnection of cognitive personal area networks (CPANs) is described and its performance is evaluated through probabilistic analysis and the results show that the collisions with primary source transmissions do not affect bridge performance at low to medium CPAN traffic.
Adaptive Cycle-Controlled E-Limited Polling in Bluetooth Piconets
Jelena Misic,Vojislav B. Misic +1 more
Proceedings ArticleDOI
Model-based Performance Evaluation of a Moving Target Defense System
TL;DR: This paper develops Markov process-based models for two different MTD strategies and derive the formulas for metrics of interest and conducts numerical analysis for comparing these two different strategies in terms of system performance.
Journal ArticleDOI
Understanding Performance of a Vulnerable Heterogeneous Edge Data Center: A Modeling Approach
TL;DR: This paper develops an analytical model, which can capture the dynamics of an EDC system with the following features: The system is under heterogeneous workloads, the system is subject to attacks, which prevent equipment units in the system from providing service and the jobs in the systems are delay-sensitive.
Journal ArticleDOI
Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network
TL;DR: Wang et al. as mentioned in this paper developed an analytic model and derived formulas of both relative revenue and system throughput, which are applied to study attack severity in imperfect Bitcoin networks and validate their analysis method and show that imperfect networks favor attackers.