Author of the publication

An Effective Attack Detection Approach in Wireless Mesh Networks.

, , , , and . AINA Workshops, page 1450-1455. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A passive testing approach based on invariants: application to the WAP, , , and . Comput. Networks, 48 (2): 235-245 (2005)A GSM-MAP Protocol Experiment Using Passive Testing., , and . World Congress on Formal Methods, volume 1708 of Lecture Notes in Computer Science, page 915-934. Springer, (1999)HTTP/2 Attacks Generation using 5Greplay., , , , and . ARES, page 138:1-138:7. ACM, (2023)SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks., , , , , , , , , and 5 other author(s). ARES, page 108:1-108:10. ACM, (2021)Special issue on formal active and passive testing of distributed and networked systems., , and . Ann. des Télécommunications, 70 (3-4): 83-84 (2015)Formal Verification of Coordination Systems' Requirements - A Case Study on the European Train Control System., and . SEKE, page 393-396. Knowledge Systems Institute Graduate School, (2014)Design of a Secure Shield for Internet and Web-Based Services Using Software Reflection., , , , and . ICWS, volume 10966 of Lecture Notes in Computer Science, page 472-486. Springer, (2018)An Analysis of Secure M2M Communication in WSNs Using DTLS., , and . ICDCS Workshops, page 78-83. IEEE Computer Society, (2016)Standardization of Formal Methods in Conformance Testing of Communication Protocols., , and . Computer Networks and ISDN Systems, 29 (1): 3-14 (1996)On Testing against Partial Non-observable Specifications., , and . QUATIC, page 230-233. IEEE Computer Society, (2014)