Author of the publication

An Effective Attack Detection Approach in Wireless Mesh Networks.

, , , , and . AINA Workshops, page 1450-1455. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking., , , , , , , , and . IEEE Trans. Inf. Forensics Secur., 14 (9): 2470-2485 (2019)Software Defined Monitoring (SDM) for 5G mobile backhaul networks., , , , , , and . LANMAN, page 1-6. IEEE, (2017)Leveraging LTE security with SDN and NFV., , , , , and . ICIIS, page 220-225. IEEE, (2015)Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms., , , , , and . ICTSS, volume 11812 of Lecture Notes in Computer Science, page 270-278. Springer, (2019)A Framework for Security Monitoring of Real IoT Testbeds., , , and . ICSOFT, page 645-652. SCITEPRESS, (2021)Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN., , , , , and . IM, page 594-598. IFIP, (2019)Toward Deterministic Communications in 6G Networks: State of the Art, Open Challenges and the Way Forward., , , , , , , , , and 6 other author(s). IEEE Access, (2023)The Role of Machine Learning in Cybersecurity., , , , , , and . CoRR, (2022)5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection., , , , and . ARES, page 106:1-106:8. ACM, (2021)Towards improving explainability, resilience and performance of cybersecurity analysis of 5G/IoT networks (work-in-progress paper)., , , and . ICST Workshops, page 7-10. IEEE, (2022)