Author of the publication

PWC: A proactive worm containment solution for enterprise networks.

, , , , , and . SecureComm, page 433-442. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services., , , and . IEEE Trans. Dependable Secur. Comput., 6 (3): 188-201 (2009)A Multi-Point Distance-Bounding Protocol for Securing Automatic Dependent Surveillance-Broadcast in Unmanned Aerial Vehicle Applications., and . J. Comput. Sci. Technol., 35 (4): 825-842 (2020)Defending against packet injection attacks unreliable ad hoc networks., , , and . GLOBECOM, page 5. IEEE, (2005)Reserving Processors by Precise Scheduling of Mixed-Criticality Tasks., , , and . RTCSA, page 103-108. IEEE, (2021)KTR: an Efficient Key Management Scheme For Air Access Control., , , and . MobiQuitous, page 499-501. IEEE Computer Society, (2005)Originator Data Security for Collaborative Task Execution among Weak Devices., and . MASS, page 421-422. IEEE Computer Society, (2013)Efficient code diversification for network reprogramming in sensor networks.. WISEC, page 145-150. ACM, (2010)Analysis of area-congestion-based DDoS attacks in ad hoc networks., , and . Ad Hoc Networks, 5 (5): 613-625 (2007)Marcher: A Heterogeneous System Supporting Energy-Aware High Performance Computing and Big Data Analytics., , and . Big Data Res., (2017)Securing ADS-B with Multi-Point Distance-Bounding for UAV Collision Avoidance., and . MASS, page 145-153. IEEE, (2019)