Books
- S. Yu, X. Lin, J. Misic and X. Shen (eds). "Networking for Big Data", CRC Press 2015
- V. B. Mišić and J. Mišić (eds.). Machine-To-Machine Communications – Architectures, Technology, Standards, and Applications. Boca Raton, FL: CRC Press, 2014.
- J. Mišic and V. B. Mišic."Wireless
Personal Area Networks: Performance, Interconnection and Security with
IEEE.802.15.4". Chichester, UK: John Wiley & Sons, Hardcover:
320 pages ISBN-10: 0470518472 ISBN-13: 978-0470518472 , 2008
- J. Mišic and V. B. Mišic. Performance
Modeling and Analysis of Bluetooth Networks: Network Formation,
Polling, Scheduling, and Traffic Control. Boca Raton, FL: CRC Press,
Hardcover, 309 pages, 2006, ISBN 0-8493-3157-9.
-
Book Chapters
- H. Khojasteh, J. Misic and VB. Misic "Admission control in cloud systems", chapter in Book, Advances in Mobile Cloud Computing Systems, 2015, Eds R. F. Yu. and VCM. Leung
- C. Campolo, A. Molinaro, R. Scopigno, S. Ozturk, J. Mišić, and V. B. Mišić. “The MAC Layer of VANETs”, chapter 4 (pp 83-122) in Vehicular ad hoc Networks, C. Campolo, A. Molinaro, and R. Scopigno (eds.), Springer-Verlag, 2015
- N. Beigi Mohammadi, Jelena Misic, Vojislav B. Misic, and Hamzeh Khazaei: "Intrusion Detection System for Machine-to-Machine Communication in Smart Grid" , in book Machine-To-Machine Communications – Architectures, Technology, Standards, and Applications, Jelena Mišić and Vojislav B. Mišić (eds.), Boca Raton, FL: CRC Press, 2014.
- H.
Khazaei, J. Misic V. Misic: "Performance Evaluation of
Cloud Data Centers with Batch Task Arrivals", Chapter 9 in
Communication Infrastructures for Cloud Computing: Design and
Applications, edited by H. Mouftah and B. Kantarci, published by IGI
Global, 2013, HersheyPA, 17033, pp. 199-223, ISBN 978-1-4666-4522-6
- H.
Khazaei, J. Misic V. Misic " On the performance and
dimensioning
of cloud computing ", Chapter 8 in Cloud computing:
methodology, system, and applications, edited by L Wang, R Ranjan, J
Chen, B Benatallah, pp. 151-165 CRC, FL: CRC Press, 2011
- V.
B. Mišić and J. Mišić: “Cognitive MAC Protocol with Transmission Tax:
Probabilistic Analysis and Performance Improvements, in Cognitive Radio
Mobile Ad Hoc Networks, Richard Yu (editor), Springer , 1st edition,
ISBN 978-1-4419-6171-6, 2010
- Md.
M. Haque, J. Mišic, V. B. Mišic, S. Biswas, and S.
Rashwand. "Vehicular network security", in Encyclopedia of Wireless and
Mobile Communications, 2nd edition, Borko Furht (editor), Boca Raton,
FL: CRC Press, 2009
- J.
Mišic , M. A. I. Khair, and V. Mišic (2009).
"Performance of bridging algorithms in IEEE 802.15.3 multi-piconet
networks", chapter in Handbook on Sensor Networks, edited by Hui Chen,
Yang Xiao and Frank Li, New York: World Scientific.
- J.
Mišic and V. B. Mišic (2009). "Patient privacy in
healthcare wireless sensor networks", chapter in Handbook of Security
and Networks, edited by Yang Xiao, Frank Li and Hui Chen, New York:
World Scientific.
- J.
Mišic (2009). "Tradeoff between key-exchange frequency
and network lifetime for interconnected IEEE 802.15.4 Beacon Enabled
clusters", chapter in From Problem to Solution: Wireless Sensor
Networks Security, edited by Zhen Jiang and Yi Pan, Nova Biomedical
Books.
- J. Mišic (2009).
"Impact of reliable and secure sensing
on cluster lifetime in IEEE 802.15,4 networks", chapter 16, pp.
389-414, in Emerging
Wireless LANs, Wireless PANs, and Wireless MANs: IEEE 802.11, IEEE
802.15, 802.16 Wireless Standard Family, edited by Y. Xiao and Yi Pan,
New York: John Wiley & Sons.
- J.
Mišic, S. Shafi,
and V. B. Mišic (2009). "Admission
control issues in 802.15.4 sensor clusters", chapter in Handbook on
Mobile Ad Hoc and Pervasive Communications, edited by L. T. Yang and M.
Denko, Stevenson Ranch, CA: American Scientific Publishers.
- M.
A. I. Khair, J.
Mišic and V. Mišic (2009). "Piconet
Interconnection Strategies in IEEE 802.15.3", chapter 8 in Unlicensed
Mobile Access Technology: Protocols, Architectures, Security, Standards
and Applications (pp. 147-162), edited by Y. Zhang, L.T. Yang and
Jianghua Ma, Boca Raton, FL: Auerbach Publications
- F.
Amini, M. Khan and J. Mišic (2008). "Power Management
and Security in IEEE 802.15.4 Clusters: How to Balance?," chapter 13 in
Mobile Telemedicine: A Computing and Networking Perspective (pp.
237-266), edited by Y. Xiao and H. Chen, Boca Raton, FL: Auerbach
Publications.
- J.
Mišic, F. Amini and M. Khan (2007). "Signature-Based Intrusion
Detection in Wireless Sensor Networks implemented over IEEE
802.15.4 beacon enabled clusters", in Encyclopedia of Wireless and
Mobile Communications (pp.
404-411), edited by Borko Furht, Boca Raton, FL: CRC Press.
- J.
Misic , "Energy Consumption of Key
Distribution in 802.15.4 Beacon Enabled Cluster with Sleep Management",
Chapter 8, pp. 169-190, in Security in Distributed
and
Networking
Systems,
edited by Yi Pan and Yang Xiao, published by World Scientific, 2007
- J.
Mišic and R. Udayshankar,
"Cluster Interconnections in IEEE 802.15.4 beacon enabled
networks",
-
M.
Khan and J. Mišic, "Security in
IEEE 802.15.4 cluster based networks", Chapter in the
book "Security in Wireless Mesh Networks", edited by Yang Zhang, J.
Zheng and H. Hu, Auerbach
Publications, Taylor & Francis Group 2008
- V.
B. Mišic and J. Mišic, "Medium
Access in Ad Hoc and Sensor Networks", a Chapter in The Handbook of
Computer Networks, Edited by H. Bidgoli, John Wiley
& Sons, New York, NY. 2007.
- F.
Amini, V. B. Mišic and J. Mišic,
"Intrusion Detection in Wireless Sensor Networks", Chapter 6, pp
111-128, in
Security in Distributed, Grid and Pervasive Computing, Edited by Yang
Xiao, Auerbach
Publications, Taylor & Francis Group, 2007, ISBN 10:
0-8493-7921-0
, 13: 978-0-8493-7921-5
- J.
Mišic, V. B. Mišic, "Security
Issues
in Wireless Sensor Networks used in Clinical Information Systems",
Chapter 17 for Wireless/Mobile Network Security, Edited by Prof. Yang
Xiao, Prof. Xuemin (Sherman) Shen, and Prof. Ding-Zhu Du, Springer
2007, ISBN-10: 0-387-28040-5, ISBN-13: 978-0-387-28040-0.
- J.
Mišic, G.R.
Reddy, and V. B. Mišic "Activity scheduling in Bluetooth based sensor
networks" chapter
for "Resource, Mobility and Security Management in Wireless Networks
and Mobile Communications" Auerbach Publications,
Y.
Zhang , H.
Hu and M. Fujise (editors)
, CRC Press, Auerbach
Publications, Taylor & Francis Group, 2007
- V. B.
Mišic, J. Fung, and J. Mišic.
"MAC Layer Attacks in 802.15.4 Sensor Networks", chapter 2,
pp. 27-46, in Security
in Sensor Networks, Yang Xiao (editor), Auerbach Publications, Taylor
& Francis Group, 2007
- J.
Mišic, V. B. Mišic, and K. L. Chan. "TCP
performance in Bluetooth scatternets", chapter 15 in Design and
Analysis of Wireless Networks, Yi Pan and Yang Xiao (editors), Nova
Science Publishers, 2005, (ISBN 0849328322)
- J.
Mišic and V. B. Mišic. "Adaptive
Cycle-Controlled E-Limited Polling in Bluetooth Piconets", chapter 18,
pp. 283-296,
in Handbook on Theoretical and Algorithmic Aspects of Sensor,
Ad Hoc Wireless and
Peer-to-Peer Networks, J. Wu (editor), Auerbach Publications, Taylor
& Francis Group, 2006, (ISBN
0849328322)
- J.
Mišic and V. B. Mišic. "An
Overview
of Intra- and Inter-Piconet Scheduling Algorithms in Bluetooth",
chapter 31, pp. 725-735, in the Handbook of Algorithms for
Mobile and Wireless
Networking and Computing, A. Boukerche(editors), CRC Press, 2006 (ISBN:
1584884657)