Author of the publication

The effect of buffer management strategies on 6LoWPAN's response to buffer reservation attacks.

, and . ICC, page 1-7. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Perspective on Providing Cloud Computing Security - A Position Paper., , , , and . CLOSER, page 650-655. SciTePress, (2011)The Threat of Adversarial Attacks on Machine Learning in Network Security - A Survey., , , and . CoRR, (2019)A Discussion on Security Education in Academia., , , , , and . ACM Conference on Computer and Communications Security, page 2187-2188. ACM, (2018)Improved SDN responsiveness to UDP flood attacks., , and . CNS, page 715-716. IEEE, (2015)Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management., , and . ACNS, volume 3531 of Lecture Notes in Computer Science, page 104-121. (2005)Proactive Allocation as Defense for Malicious Co-residency in Sliced 5G Core Networks., and . CoRR, (2020)Towards power profiling of Android permissions., , and . NTMS, page 1-5. IEEE, (2015)One Pass Packet Steering (OPPS) for stateless policy chains in multi-subscriber SDN., , and . INFOCOM Workshops, page 408-413. IEEE, (2017)Optimal Slice Allocation in 5G Core Networks., and . CoRR, (2018)IoT Trust Establishment Through System Level Interactions and Communication Attributes., , , and . GLOBECOM, page 5919-5924. IEEE, (2023)