Author:
Verma Pramode K.,El Rifai Mayssaa,Chan Kam Wai Clifford
Reference5 articles.
1. El Hajj, R., MacDonald, G., Verma, P., & Huck, R. (2015). Implementing and testing a fiber-optic polarization-based intrusion detection system. Optical Engineering, 54(9), 096107.
2. MacDonald. G. G., & Sluss, J. J., Jr. (2011). Method for polarization-based intrusion monitoring in fiberoptic links. US Patent No. US 7903977 B2, March 8, 2011.
3. Bhosale, S., Darunkar, B., Punekar, N., MacDonald, G., & Verma, P. (2016). Polarization based secure AES key transmission over optical fiber. In 2016 IEEE International Conference on Communications (ICC) (pp. 1–6).
4. Hopkins, B., & Skellam, J. G. (1954). A new method for determining the type of distribution of plant individuals. Annals of Botany, 18(2), 213–227.
5. Galambos, J. (1994). Extreme value theory for applications. In Extreme value theory and applications (pp. 1–14). Berlin: Springer.