Author of the publication

DRAMA: Distributed Policy Management for MANETs.

, and . POLICY, page 235-237. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PECAN: Policy-Enabled Configuration Across Networks., , , , , , , , , and 1 other author(s). POLICY, page 52-62. IEEE Computer Society, (2003)Enabling Distributed Management for Dynamic Airborne Networks., , , , , , , and . POLICY, page 102-105. IEEE Computer Society, (2009)DRAMA: Distributed Policy Management for MANETs., and . POLICY, page 235-237. IEEE Computer Society, (2008)Policy-Based Mobile Ad Hoc Network Management., , , , , , and . POLICY, page 35-44. IEEE Computer Society, (2004)Application of Learning Using Privileged Information(LUPI): Botnet Detection., , , and . ICCCN, page 1-8. IEEE, (2017)Leveraging social network for predicting demand and estimating available resources for communication network management., , , , and . Integrated Network Management, page 547-554. IEEE, (2011)Measuring the Effectiveness of Network Deception., , , , , , and . ISI, page 142-147. IEEE, (2018)Finding Logical Consequences Using Unskolemization., and . ISMIS, volume 689 of Lecture Notes in Computer Science, page 255-264. Springer, (1993)Limitations of the Lipschitz Constant as a Defense Against Adversarial Examples., , and . Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML, volume 11329 of Lecture Notes in Computer Science, page 16-29. Springer, (2018)Insider attack detection using weak indicators over network flow data., , , , , and . MILCOM, page 1-6. IEEE, (2015)