Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guest editorial - policy-based networking., , and . IEEE Netw., 16 (2): 8-9 (2002)Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems., , , , , and . MILCOM, page 874-879. IEEE, (2021)Nature inspired collaborative team autonomy (NICiTA)., , , and . MILCOM, page 756-761. IEEE, (2015)Testing android devices for tactical networks: A hybrid emulation testbed approach., , , , , and . MILCOM, page 489-494. IEEE, (2015)Feature Interactions in Overlay Networks., , , and . FIW, page 91-297. IOS Press, (2005)CyberVAN: A Cyber Security Virtual Assured Network testbed., , , , , , , , , and 2 other author(s). MILCOM, page 1125-1130. IEEE, (2016)Enabling reproducible cyber research - four labeled datasets., , , , , and . MILCOM, page 539-544. IEEE, (2016)Towards the Development of Robust Deep Neural Networks in Adversarial Settings., , , and . MILCOM, page 419-424. IEEE, (2018)Application of Learning Using Privileged Information(LUPI): Botnet Detection., , , and . ICCCN, page 1-8. IEEE, (2017)Leveraging social network for predicting demand and estimating available resources for communication network management., , , , and . Integrated Network Management, page 547-554. IEEE, (2011)