Author of the publication

Characterization of Blacklists and Tainted Network Traffic.

, , , , and . PAM, volume 7799 of Lecture Notes in Computer Science, page 218-228. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sufficient Conditions on the Optimality of Myopic Sensing in Opportunistic Channel Access: A Unifying Framework., , and . CoRR, (2013)Online Learning in a Contract Selection Problem, and . CoRR, (2013)On the Many-to-One Transport Capacity of a Dense Wireless Sensor Network and the Compressibility of Its Data., , , and . IPSN, volume 2634 of Lecture Notes in Computer Science, page 1-16. Springer, (2003)Sniffer Channel Assignment With Imperfect Monitoring for Cognitive Radio Networks., , , , and . IEEE Trans. Wirel. Commun., 15 (3): 1703-1715 (2016)Server allocation with delayed state observation: Sufficient conditions for the optimality of an index policy., and . IEEE Trans. Wirel. Commun., 8 (4): 1693-1705 (2009)Corrections to "Preference-Based Privacy Markets"., , , , , , , , , and . IEEE Access, (2021)Embracing and controlling risk dependency in cyber-insurance policy underwriting., , and . J. Cybersecur., 5 (1): tyz010 (2019)Opting Out of Incentive Mechanisms: A Study of Security as a Non-Excludable Public Good., and . IEEE Trans. Inf. Forensics Secur., 11 (12): 2790-2803 (2016)Optimal relay selection with non-negligible probing time., , and . ICC, page 2227-2232. IEEE, (2015)Power-Management Techniques for Wireless Sensor Networks and Similar Low-Power Communication Devices Based on Nonrechargeable Batteries., , and . J. Comput. Networks Commun., (2012)